Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dMDImIGmc7.exe

Overview

General Information

Sample name:dMDImIGmc7.exe
renamed because original name is a hash value
Original sample name:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085.exe
Analysis ID:1572419
MD5:4221ca1a9f9f6e0c9b9ddd58e2c2f863
SHA1:812eda18b362a8f6cdc7aad46967fba7782427d2
SHA256:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085
Tags:exexluzoia8user-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:66
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • dMDImIGmc7.exe (PID: 7528 cmdline: "C:\Users\user\Desktop\dMDImIGmc7.exe" MD5: 4221CA1A9F9F6E0C9B9DDD58E2C2F863)
    • msiexec.exe (PID: 7664 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7700 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7772 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding BE66020F81508C3F8258167FE81C4454 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7832 cmdline: rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7872 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding EF27ABBBD28DFDC71F243553BD80169A MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 7916 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 84FED5A02A4478A6BB5B277844992BE5 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7960 cmdline: "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=b6c7f42a-9f77-4056-ac17-baae7e96c3ca&k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE" MD5: 75B21D04C69128A7230A0998086B61AA)
    • ScreenConnect.WindowsClient.exe (PID: 8024 cmdline: "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "a91f678a-772f-4588-8776-9c2dc2738ecd" "User" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
  • svchost.exe (PID: 7232 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dMDImIGmc7.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Installer\inprogressinstallinfo.ipiJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Temp\~DF500630DB60D35AD6.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Temp\~DF638D1B817E631DF7.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          C:\Windows\Temp\~DF58819F7730A4E8E0.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            C:\Windows\Temp\~DFAC928A1F31CE2CD0.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              00000000.00000002.1393151526.0000000005BF0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000009.00000002.2598425773.0000000002511000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      Process Memory Space: dMDImIGmc7.exe PID: 7528JoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        Click to see the 2 entries
                        SourceRuleDescriptionAuthorStrings
                        0.2.dMDImIGmc7.exe.5bf0000.17.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          9.2.ScreenConnect.WindowsClient.exe.258fa18.3.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            9.0.ScreenConnect.WindowsClient.exe.2b0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              0.2.dMDImIGmc7.exe.5bf0000.17.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                0.0.dMDImIGmc7.exe.b95db0.3.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                  Click to see the 3 entries

                                  System Summary

                                  barindex
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (65d97bc8a263f920) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7700, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-D186-9B9F99980CD0}\(Default)
                                  Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments, CommandLine: rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments, CommandLine|base64offset|contains: IBy, Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding BE66020F81508C3F8258167FE81C4454 C, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 7772, ParentProcessName: msiexec.exe, ProcessCommandLine: rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments, ProcessId: 7832, ProcessName: rundll32.exe
                                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7232, ProcessName: svchost.exe
                                  No Suricata rule has matched

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: dMDImIGmc7.exeReversingLabs: Detection: 26%
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.6% probability
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeEXE: msiexec.exeJump to behavior

                                  Compliance

                                  barindex
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeEXE: msiexec.exeJump to behavior
                                  Source: dMDImIGmc7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: dMDImIGmc7.exeStatic PE information: certificate valid
                                  Source: dMDImIGmc7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: dMDImIGmc7.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb#oc source: ScreenConnect.ClientService.exe, 00000008.00000002.2596095040.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2612432432.0000000002AF7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dMDImIGmc7.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2612033137.000000001AEE2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2597895484.0000000002370000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2598425773.0000000002511000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1390396560.00000000007AD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1364587587.00000000049A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: dMDImIGmc7.exe, 54fbad.msi.3.dr, MSIFDD0.tmp.3.dr, 54fbaf.msi.3.dr, 54fbae.rbs.3.dr, ScreenConnect.ClientSetup.msi.0.dr, MSI1AA.tmp.3.dr, MSIFDFF.tmp.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2612432432.0000000002AF7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: dMDImIGmc7.exe, 54fbad.msi.3.dr, 54fbaf.msi.3.dr, MSIF592.tmp.2.dr, ScreenConnect.ClientSetup.msi.0.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2598039735.00000000023B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2598039735.00000000023B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2622398825.000000000504A000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2612432432.0000000002AF7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: dMDImIGmc7.exe
                                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile opened: c:
                                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                                  Networking

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficDNS traffic detected: DNS query: instance-jqk235-relay.screenconnect.com
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: svchost.exe, 0000000A.00000002.2597767667.00000233E788D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                                  Source: edb.log.10.dr, qmgr.db.10.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.2596095040.00000000010DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.2596095040.00000000010DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/LA
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001CC8000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001E10000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001C4B000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001D8F000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001C1E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001ECF000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001FAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/d
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1345943833.0000000003211000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001B52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362835054.00000000049A3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                                  Source: rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362835054.00000000049A3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                                  Source: rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362835054.00000000049A3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                                  Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
                                  Source: qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                                  Source: svchost.exe, 0000000A.00000003.1437097336.00000233E76F0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                                  Source: qmgr.db.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe1C:
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49959 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior

                                  System Summary

                                  barindex
                                  Source: dMDImIGmc7.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_0529D59C CreateProcessAsUserW,8_2_0529D59C
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\54fbad.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{725BED6F-EB1D-3595-B4AC-1BF7669F9138}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFDD0.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFDFF.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1AA.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\54fbaf.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\54fbaf.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{725BED6F-EB1D-3595-B4AC-1BF7669F9138}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{725BED6F-EB1D-3595-B4AC-1BF7669F9138}\DefaultIconJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.SchedServiceConfig.rmiJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\4odihyeo.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\4odihyeo.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\wveyxedr.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\wveyxedr.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\5glugegh.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\5glugegh.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\1xpom3c3.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\1xpom3c3.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\iklj1tnw.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\iklj1tnw.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\s4uhbnlc.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\s4uhbnlc.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\qas3jnn3.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\qas3jnn3.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\ytxtb1fb.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\ytxtb1fb.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\sffmd2n0.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\sffmd2n0.newcfgJump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIFDFF.tmpJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B587B80_2_05B587B8
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B5BA300_2_05B5BA30
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B587A80_2_05B587A8
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B57D800_2_05B57D80
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B70CB80_2_05B70CB8
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B71E9B0_2_05B71E9B
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_01A9D5688_2_01A9D568
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_0529D7108_2_0529D710
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_052991A08_2_052991A0
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_052972188_2_05297218
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_0529D7108_2_0529D710
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_052972188_2_05297218
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB55708A9_2_00007FFAAB55708A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB5510CF9_2_00007FFAAB5510CF
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB5510D79_2_00007FFAAB5510D7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB86000C9_2_00007FFAAB86000C
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB8676D39_2_00007FFAAB8676D3
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB86B6C19_2_00007FFAAB86B6C1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB870EFA9_2_00007FFAAB870EFA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB866DE29_2_00007FFAAB866DE2
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB8710D39_2_00007FFAAB8710D3
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB86951B9_2_00007FFAAB86951B
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.000000000100F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.000000000100F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1393151526.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1393151526.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1393151526.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1393151526.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1379944572.00000000056F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1388914319.0000000005910000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1388914319.0000000005910000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1388914319.0000000005910000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1363971681.00000000043D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1345943833.0000000003ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1345943833.0000000003ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1345943833.0000000003ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1384281425.00000000058F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1345943833.00000000038FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1345870710.0000000001900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenamezlib.dll2 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: 0.2.dMDImIGmc7.exe.56f0000.9.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                                  Source: 0.0.dMDImIGmc7.exe.ae63d4.5.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.dMDImIGmc7.exe.b6c3d4.2.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: 0.0.dMDImIGmc7.exe.b6c3d4.2.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.0.dMDImIGmc7.exe.b6c3d4.2.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.0.dMDImIGmc7.exe.b6c3d4.2.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: classification engineClassification label: mal66.evad.winEXE@16/64@3/2
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)Jump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dMDImIGmc7.exe.logJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeMutant created: NULL
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                                  Source: dMDImIGmc7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: dMDImIGmc7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: dMDImIGmc7.exeReversingLabs: Detection: 26%
                                  Source: dMDImIGmc7.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                  Source: dMDImIGmc7.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile read: C:\Users\user\Desktop\dMDImIGmc7.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\dMDImIGmc7.exe "C:\Users\user\Desktop\dMDImIGmc7.exe"
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"
                                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BE66020F81508C3F8258167FE81C4454 C
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EF27ABBBD28DFDC71F243553BD80169A
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 84FED5A02A4478A6BB5B277844992BE5 E Global\MSI0000
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=b6c7f42a-9f77-4056-ac17-baae7e96c3ca&k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE"
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "a91f678a-772f-4588-8776-9c2dc2738ecd" "User"
                                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BE66020F81508C3F8258167FE81C4454 CJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EF27ABBBD28DFDC71F243553BD80169AJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 84FED5A02A4478A6BB5B277844992BE5 E Global\MSI0000Jump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "a91f678a-772f-4588-8776-9c2dc2738ecd" "User"Jump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rtutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: dwrite.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: dMDImIGmc7.exeStatic PE information: certificate valid
                                  Source: dMDImIGmc7.exeStatic file information: File size 5620136 > 1048576
                                  Source: dMDImIGmc7.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: dMDImIGmc7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: dMDImIGmc7.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb#oc source: ScreenConnect.ClientService.exe, 00000008.00000002.2596095040.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2612432432.0000000002AF7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dMDImIGmc7.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2612033137.000000001AEE2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2597895484.0000000002370000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2598425773.0000000002511000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1390396560.00000000007AD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1364587587.00000000049A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: dMDImIGmc7.exe, 54fbad.msi.3.dr, MSIFDD0.tmp.3.dr, 54fbaf.msi.3.dr, 54fbae.rbs.3.dr, ScreenConnect.ClientSetup.msi.0.dr, MSI1AA.tmp.3.dr, MSIFDFF.tmp.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2612432432.0000000002AF7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: dMDImIGmc7.exe, 54fbad.msi.3.dr, 54fbaf.msi.3.dr, MSIF592.tmp.2.dr, ScreenConnect.ClientSetup.msi.0.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2598039735.00000000023B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2598039735.00000000023B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2622398825.000000000504A000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2612432432.0000000002AF7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.2609226380.0000000012520000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                  Data Obfuscation

                                  barindex
                                  Source: 0.0.dMDImIGmc7.exe.10178ec.4.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                                  Source: 0.2.dMDImIGmc7.exe.1900000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                                  Source: dMDImIGmc7.exeStatic PE information: real checksum: 0x54d1c1 should be: 0x5675b7
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_017C70B0 push eax; mov dword ptr [esp], ecx0_2_017C70C1
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B56460 pushfd ; retf 0_2_05B56461
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B56462 push 8405B2CBh; retf 0_2_05B56469
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B53ACF push ebx; retf 0_2_05B53ADA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_040C3A9B push ebx; retf 8_2_040C3ADA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_0529B550 push eax; mov dword ptr [esp], ecx8_2_0529B551
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_0529C600 push eax; mov dword ptr [esp], ecx8_2_0529C601
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_052953F1 push eax; mov dword ptr [esp], ecx8_2_05295401
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_057DBCF8 pushad ; iretd 8_2_057DBCF9
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_057DBCE0 push eax; iretd 8_2_057DBCE1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB5622ED push ebx; retf 9_2_00007FFAAB5622FA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB5608CD push ebx; retf 9_2_00007FFAAB56098A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB56096D push ebx; retf 9_2_00007FFAAB56098A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB8692B9 push 0000006Ch; iretd 9_2_00007FFAAB8693B4
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB869355 push 0000006Ch; iretd 9_2_00007FFAAB8693B4
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB862F5A pushfd ; iretd 9_2_00007FFAAB862F5B
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB868EF8 pushad ; retn 6032h9_2_00007FFAAB86919D
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB86C1A6 push ds; iretd 9_2_00007FFAAB86C22F
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFAAB8674FD push ebx; iretd 9_2_00007FFAAB86756A

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: c:\program files (x86)\screenconnect client (65d97bc8a263f920)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-d186-9b9f99980cd0}\inprocserver32
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFDFF.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1AA.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFDFF.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1AA.tmpJump to dropped file
                                  Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (65d97bc8a263f920)Jump to behavior

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: dMDImIGmc7.exe, 00000000.00000002.1388914319.0000000005910000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: dMDImIGmc7.exe, 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: rundll32.exe, 00000005.00000003.1362653443.0000000004B1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2616633125.000000001B432000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2612033137.000000001AEE2000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2597895484.0000000002370000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2598425773.0000000002511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: dMDImIGmc7.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 17C0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 3210000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 1840000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 6A40000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 6120000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMemory allocated: 1940000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMemory allocated: 1AF0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMemory allocated: 3AF0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeMemory allocated: A60000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeMemory allocated: 1A510000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIFDFF.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1AA.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeAPI coverage: 3.1 %
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exe TID: 7548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe TID: 8008Thread sleep count: 51 > 30Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe TID: 6068Thread sleep time: -30000s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\svchost.exe TID: 7280Thread sleep time: -30000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: svchost.exe, 0000000A.00000002.2597703567.00000233E7854000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.2596671295.00000233E222B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.2622398825.000000000503A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: page read and write | page guardJump to behavior

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: 0.0.dMDImIGmc7.exe.10178ec.4.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                                  Source: 0.2.dMDImIGmc7.exe.56f0000.9.raw.unpack, NativeLibrary.csReference to suspicious API methods: LoadLibrary(type, assemblyTypeHint)
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                                  Source: 0.2.dMDImIGmc7.exe.5910000.13.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (65d97bc8a263f920)\screenconnect.clientservice.exe" "?e=access&y=guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=b6c7f42a-9f77-4056-ac17-baae7e96c3ca&k=bgiaaackaabsu0exaagaaaeaaqcflxydurhermiw7%2fdjmbn4kt%2bzyqufmz9tdkd6iuwhl0tx7eqyjvjwqck9bbnlxrevgy0d%2bi2hgkweucucvgzyhkiygple75sbfoihluunwnxge4hut7fyaqzpmwhbg9wjhkinwnz48oytj3wdlnwvm1aglpzosvmc81lgzimk2f20l3ytsr71eudyff4mjuecdzdunss38hqmnm9k2oygsqmvi6d5mbnblfu5yiei3306j9iigalvfmuj%2b6%2fqmdfym1dlm1qc2ut2gm%2b79f1e4wq7hn0vtxrxkvj2nhexc9t8vzmoeq9p2cgsizlqjqmzsub1gud9kbjfewgmvide"
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_057D14E0 CreateNamedPipeW,8_2_057D14E0
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05B52D07 RtlGetVersion,0_2_05B52D07
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                                  Source: Yara matchFile source: dMDImIGmc7.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.2.dMDImIGmc7.exe.5bf0000.17.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.258fa18.3.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.2b0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.2.dMDImIGmc7.exe.5bf0000.17.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.b95db0.3.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.b6c3d4.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.ae63d4.5.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.ad0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000002.1393151526.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000002.2598425773.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: dMDImIGmc7.exe PID: 7528, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7832, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 8024, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Windows\Installer\inprogressinstallinfo.ipi, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF500630DB60D35AD6.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF638D1B817E631DF7.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF58819F7730A4E8E0.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DFAC928A1F31CE2CD0.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF470C7A0A2610DFDB.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF2DFC37B136EBC2C8.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Config.Msi\54fbae.rbs, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Installer\MSIFDD0.tmp, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity InformationAcquire Infrastructure1
                                  Valid Accounts
                                  1
                                  Native API
                                  1
                                  DLL Side-Loading
                                  1
                                  DLL Side-Loading
                                  11
                                  Disable or Modify Tools
                                  OS Credential Dumping11
                                  Peripheral Device Discovery
                                  Remote Services11
                                  Archive Collected Data
                                  12
                                  Encrypted Channel
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomains1
                                  Replication Through Removable Media
                                  12
                                  Command and Scripting Interpreter
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  Deobfuscate/Decode Files or Information
                                  LSASS Memory1
                                  File and Directory Discovery
                                  Remote Desktop ProtocolData from Removable Media1
                                  Non-Application Layer Protocol
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain AccountsAt1
                                  Component Object Model Hijacking
                                  1
                                  Component Object Model Hijacking
                                  1
                                  Obfuscated Files or Information
                                  Security Account Manager24
                                  System Information Discovery
                                  SMB/Windows Admin SharesData from Network Shared Drive2
                                  Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal AccountsCron1
                                  Valid Accounts
                                  1
                                  Valid Accounts
                                  1
                                  Software Packing
                                  NTDS11
                                  Security Software Discovery
                                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchd2
                                  Windows Service
                                  1
                                  Access Token Manipulation
                                  1
                                  DLL Side-Loading
                                  LSA Secrets2
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                                  Bootkit
                                  2
                                  Windows Service
                                  1
                                  DLL Search Order Hijacking
                                  Cached Domain Credentials41
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                                  Process Injection
                                  1
                                  File Deletion
                                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                                  Masquerading
                                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                                  Valid Accounts
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                                  Access Token Manipulation
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd41
                                  Virtualization/Sandbox Evasion
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                                  Process Injection
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                                  Hidden Users
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                                  Bootkit
                                  Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                                  Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                                  Rundll32
                                  Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572419 Sample: dMDImIGmc7.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 66 55 server-nix0992c762-relay.screenconnect.com 2->55 57 instance-jqk235-relay.screenconnect.com 2->57 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 .NET source code references suspicious native API functions 2->69 71 4 other signatures 2->71 8 msiexec.exe 94 48 2->8         started        12 ScreenConnect.ClientService.exe 17 21 2->12         started        15 dMDImIGmc7.exe 6 2->15         started        17 svchost.exe 2->17         started        signatures3 process4 dnsIp5 35 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->35 dropped 37 C:\...\ScreenConnect.ClientService.exe, PE32 8->37 dropped 39 C:\Windows\Installer\MSIFDFF.tmp, PE32 8->39 dropped 43 9 other files (none is malicious) 8->43 dropped 73 Enables network access during safeboot for specific services 8->73 75 Modifies security policies related information 8->75 19 msiexec.exe 8->19         started        21 msiexec.exe 1 8->21         started        23 msiexec.exe 8->23         started        59 server-nix0992c762-relay.screenconnect.com 147.28.146.16, 443, 49725, 49734 RGNET-SEARGnetSeattleWestinEE United States 12->59 77 Reads the Security eventlog 12->77 79 Reads the System eventlog 12->79 25 ScreenConnect.WindowsClient.exe 2 12->25         started        41 C:\Users\user\AppData\...\dMDImIGmc7.exe.log, ASCII 15->41 dropped 81 Contains functionality to hide user accounts 15->81 28 msiexec.exe 6 15->28         started        61 127.0.0.1 unknown unknown 17->61 file6 signatures7 process8 file9 31 rundll32.exe 11 19->31         started        83 Contains functionality to hide user accounts 25->83 45 C:\Users\user\AppData\Local\...\MSIF592.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 63 Contains functionality to hide user accounts 31->63 signatures13

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  dMDImIGmc7.exe26%ReversingLabsWin32.PUA.ConnectWise
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSIF592.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://wixtoolset.org/news/0%Avira URL Cloudsafe
                                  http://wixtoolset.org/releases/0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/d0%Avira URL Cloudsafe
                                  http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/LA0%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  server-nix0992c762-relay.screenconnect.com
                                  147.28.146.16
                                  truefalse
                                    unknown
                                    s-part-0035.t-0009.t-msedge.net
                                    13.107.246.63
                                    truefalse
                                      high
                                      instance-jqk235-relay.screenconnect.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 0000000A.00000003.1437097336.00000233E76F0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drfalse
                                          high
                                          http://crl.ver)svchost.exe, 0000000A.00000002.2597767667.00000233E788D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://instance-jqk235-relay.screenconnect.com:443/ScreenConnect.ClientService.exe, 00000008.00000002.2596095040.00000000010DF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362835054.00000000049A3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://g.live.com/odclientsettings/Prod1C:qmgr.db.10.drfalse
                                              high
                                              http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362835054.00000000049A3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedMDImIGmc7.exe, 00000000.00000002.1345943833.0000000003211000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001B52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://instance-jqk235-relay.screenconnect.com:443/LAScreenConnect.ClientService.exe, 00000008.00000002.2596095040.00000000010DF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://instance-jqk235-relay.screenconnect.com:443/dScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001CC8000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001E10000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001C4B000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001D8F000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001C1E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001ECF000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.2599220052.0000000001FAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1362653443.0000000004AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362653443.0000000004B12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362835054.00000000049A3000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                                  high
                                                  https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    147.28.146.16
                                                    server-nix0992c762-relay.screenconnect.comUnited States
                                                    3130RGNET-SEARGnetSeattleWestinEEfalse
                                                    IP
                                                    127.0.0.1
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1572419
                                                    Start date and time:2024-12-10 15:01:10 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 8m 39s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:15
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:dMDImIGmc7.exe
                                                    renamed because original name is a hash value
                                                    Original Sample Name:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085.exe
                                                    Detection:MAL
                                                    Classification:mal66.evad.winEXE@16/64@3/2
                                                    EGA Information:
                                                    • Successful, ratio: 75%
                                                    HCA Information:
                                                    • Successful, ratio: 79%
                                                    • Number of executed functions: 249
                                                    • Number of non-executed functions: 3
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                    • Excluded IPs from analysis (whitelisted): 23.218.208.109, 13.107.246.63, 20.109.210.53
                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, time.windows.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target rundll32.exe, PID 7832 because it is empty
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                    • VT rate limit hit for: dMDImIGmc7.exe
                                                    TimeTypeDescription
                                                    09:02:23API Interceptor2x Sleep call for process: svchost.exe modified
                                                    09:02:30API Interceptor1x Sleep call for process: ScreenConnect.ClientService.exe modified
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    s-part-0035.t-0009.t-msedge.nethttps://source.scriptsafedata.comGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    https://t.ly/8cSDxGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    New Order Enquiry.jsGet hashmaliciousAgentTeslaBrowse
                                                    • 13.107.246.63
                                                    10122024Hesap hareketleriniz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • 13.107.246.63
                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 13.107.246.63
                                                    file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                    • 13.107.246.63
                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 13.107.246.63
                                                    Valutazione della sicurezza IT - Azione urgente richiesta.htmlGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 13.107.246.63
                                                    PmP4f1GPS1.exeGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    RGNET-SEARGnetSeattleWestinEEBA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                    • 147.28.185.29
                                                    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                    • 147.28.80.240
                                                    AdobeAcrobatReader.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.129.0
                                                    AdobeAcrobatReader.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.129.0
                                                    la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                    • 147.28.142.90
                                                    5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.129.8
                                                    5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.129.8
                                                    statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.129.128
                                                    statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.129.128
                                                    ScreenConnect.ClientSetup (1).exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 147.28.146.148
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dllestatement020134230003.exe.virus.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      estatement020134230003.exe.virus.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        Support.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          f53WqfzzNt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            tiG6Ep202n.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              6IqUjK9Koj.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                f53WqfzzNt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  tiG6Ep202n.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    6IqUjK9Koj.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      hB52OUUCE2.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):219475
                                                                        Entropy (8bit):6.583421218049945
                                                                        Encrypted:false
                                                                        SSDEEP:3072:mh9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG0:mhuH2aCGw1ST1wQLdqv0
                                                                        MD5:2516A200DB040A4C1282779269E86A73
                                                                        SHA1:AD9E26DB8EBF79F8B80E44E9FC1C6AE527080AB9
                                                                        SHA-256:F29C01750BC7160BD5255E15311A1618974FF9C44E2CE230BE3261CCBD982777
                                                                        SHA-512:5B8428D747FD9853E2E2E7A5A89B44157BC03E4312E29943F73AE72B55D06DAE9E2CC34CD837B27F58AC2B6C80722C5F02D06FFA30348A1685274A7E6B21FCA8
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\54fbae.rbs, Author: Joe Security
                                                                        Preview:...@IXOS.@.....@IH.Y.@.....@.....@.....@.....@.....@......&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}'.ScreenConnect Client (65d97bc8a263f920)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (65d97bc8a263f920)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{91803B2D-BCE4-4D75-2001-714374EA8E7A}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{BCD3735B-7A0B-F604-901A-84A4EB8DB724}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{B65B3FD6-55AB-3FB4-4975-FA5784A90593}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{AE0C6BF4-CA9E-EF54-C309-18275C0999FC}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{23759C26-3715-0BCF-3EBB-F5C4FF79A081}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{B82A04C0-B2DA-C30C-D7C6-1D8025EA2D1F}&.{725BED6F-EB1D-3595-B4AC
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):50133
                                                                        Entropy (8bit):4.759054454534641
                                                                        Encrypted:false
                                                                        SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                        MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                        SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                        SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                        SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                        Malicious:false
                                                                        Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):26722
                                                                        Entropy (8bit):7.7401940386372345
                                                                        Encrypted:false
                                                                        SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                        MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                        SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                        SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                        SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                        Malicious:false
                                                                        Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):197120
                                                                        Entropy (8bit):6.586775768189165
                                                                        Encrypted:false
                                                                        SSDEEP:3072:/xLtNGTlIyS7/ObjusqVFJRJcyzvYqSmzDvJXYF:FtNGTGySabqPJYbqSmG
                                                                        MD5:3724F06F3422F4E42B41E23ACB39B152
                                                                        SHA1:1220987627782D3C3397D4ABF01AC3777999E01C
                                                                        SHA-256:EA0A545F40FF491D02172228C1A39AE68344C4340A6094486A47BE746952E64F
                                                                        SHA-512:509D9A32179A700AD76471B4CD094B8EB6D5D4AE7AD15B20FD76C482ED6D68F44693FC36BCB3999DA9346AE9E43375CD8FE02B61EDEABE4E78C4E2E44BF71D42
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Joe Sandbox View:
                                                                        • Filename: estatement020134230003.exe.virus.exe, Detection: malicious, Browse
                                                                        • Filename: estatement020134230003.exe.virus.exe, Detection: malicious, Browse
                                                                        • Filename: Support.ClientSetup.exe, Detection: malicious, Browse
                                                                        • Filename: f53WqfzzNt.exe, Detection: malicious, Browse
                                                                        • Filename: tiG6Ep202n.exe, Detection: malicious, Browse
                                                                        • Filename: 6IqUjK9Koj.exe, Detection: malicious, Browse
                                                                        • Filename: f53WqfzzNt.exe, Detection: malicious, Browse
                                                                        • Filename: tiG6Ep202n.exe, Detection: malicious, Browse
                                                                        • Filename: 6IqUjK9Koj.exe, Detection: malicious, Browse
                                                                        • Filename: hB52OUUCE2.exe, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ... ....... .......................`......#.....@.................................A...O.... ..|....................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B................u.......H...........4............_...... .........................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):68096
                                                                        Entropy (8bit):6.06942231395039
                                                                        Encrypted:false
                                                                        SSDEEP:1536:+A0ZscQ5V6TsQqoSD6h6+39QFVIl1zJhb8gq:p0Zy3gUOQFVQzJq
                                                                        MD5:5DB908C12D6E768081BCED0E165E36F8
                                                                        SHA1:F2D3160F15CFD0989091249A61132A369E44DEA4
                                                                        SHA-256:FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
                                                                        SHA-512:8400486CADB7C07C08338D8876BC14083B6F7DE8A8237F4FE866F4659139ACC0B587EB89289D281106E5BAF70187B3B5E86502A2E340113258F03994D959328D
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nu............" ..0.............. ... ...@....... ..............................p.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):95512
                                                                        Entropy (8bit):6.504684691533346
                                                                        Encrypted:false
                                                                        SSDEEP:1536:Eg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkggU0HMx790K:dhbNDxZGXfdHrX7rAc6myJkggU0HqB
                                                                        MD5:75B21D04C69128A7230A0998086B61AA
                                                                        SHA1:244BD68A722CFE41D1F515F5E40C3742BE2B3D1D
                                                                        SHA-256:F1B5C000794F046259121C63ED37F9EFF0CFE1258588ECA6FD85E16D3922767E
                                                                        SHA-512:8D51B2CD5F21C211EB8FEA4B69DC9F91DFFA7BB004D9780C701DE35EAC616E02CA30EF3882D73412F7EAB1211C5AA908338F3FA10FDF05B110F62B8ECD9D24C2
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................>)....@.................................p...x....`..P............L...)...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):548864
                                                                        Entropy (8bit):6.034211651049746
                                                                        Encrypted:false
                                                                        SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                        MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                        SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                        SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                        SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1721856
                                                                        Entropy (8bit):6.639085961200334
                                                                        Encrypted:false
                                                                        SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                        MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                        SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                        SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                        SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):260168
                                                                        Entropy (8bit):6.416438906122177
                                                                        Encrypted:false
                                                                        SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                        MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                        SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                        SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                        SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):61208
                                                                        Entropy (8bit):6.310126082367387
                                                                        Encrypted:false
                                                                        SSDEEP:1536:kW/+lo6MOc8IoiKWjrNv8DtyQ4RE+TC6WAhVbb57bP8:kLlo6dccldyQGWy5s
                                                                        MD5:AFA97CAF20F3608799E670E9D6253247
                                                                        SHA1:7E410FDE0CA1350AA68EF478E48274888688F8EE
                                                                        SHA-256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
                                                                        SHA-512:FE0B378651783EF4ADD3851E12291C82EDCCDE1DBD1FA0B76D7A2C2DCD181E013B9361BBDAE4DAE946C0D45FB4BF6F75DC027F217326893C906E47041E3039B0
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c+..........."...0.................. ........@.. ....................... .......r....@.....................................O....... ................)..............8............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):266
                                                                        Entropy (8bit):4.842791478883622
                                                                        Encrypted:false
                                                                        SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                        MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                        SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                        SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                        SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):602392
                                                                        Entropy (8bit):6.176232491934078
                                                                        Encrypted:false
                                                                        SSDEEP:6144:fybAk1FVMVTZL/4TvqpU0pSdRW3akod1sI5mgve8mZXuRFtSc4q2/R4IEyxuV5AN:qbAOwJ/MvIFptJoR5NmtiFsxsFE
                                                                        MD5:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                        SHA1:0203B65E92D2D1200DD695FE4C334955BEFBDDD3
                                                                        SHA-256:600CF10E27311E60D32722654EF184C031A77B5AE1F8ABAE8891732710AFEE31
                                                                        SHA-512:A902080FF8EE0D9AEFFA0B86E7980457A4E3705789529C82679766580DF0DC17535D858FBE50731E00549932F6D49011868DEE4181C6716C36379AD194B0ED69
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............@.................................M...O.... ...................)...@..........8............................................ ............... ..H............text...p.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......XJ......................$.........................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):266
                                                                        Entropy (8bit):4.842791478883622
                                                                        Encrypted:false
                                                                        SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                        MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                        SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                        SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                        SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):842248
                                                                        Entropy (8bit):6.268561504485627
                                                                        Encrypted:false
                                                                        SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                        MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                        SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                        SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                        SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):81688
                                                                        Entropy (8bit):5.8618809599146005
                                                                        Encrypted:false
                                                                        SSDEEP:1536:Ety9l44Kzb1I5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7j27Vy:PvqukLdn2s
                                                                        MD5:1AEE526DC110E24D1399AFFCCD452AB3
                                                                        SHA1:04DB0E8772933BC57364615D0D104DC2550BD064
                                                                        SHA-256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
                                                                        SHA-512:482A8EE35D53BE907BE39DBD6C46D1F45656046BACA95630D1F07AC90A66F0E61D41F940FB166677AC4D5A48CF66C28E76D89912AED3D673A80737732E863851
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o..........."...0..@...........^... ...`....@.. .......................`.......$....@..................................^..O....`...................)...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):266
                                                                        Entropy (8bit):4.842791478883622
                                                                        Encrypted:false
                                                                        SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                        MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                        SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                        SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                        SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:XML 1.0 document, ASCII text, with very long lines (466), with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):956
                                                                        Entropy (8bit):5.787993993731163
                                                                        Encrypted:false
                                                                        SSDEEP:24:2dL9hK6E4dl/5YuPmhIkW2gUyD7mrF3rJpDFvH:chh7HH5diIkW2Py/wbjhv
                                                                        MD5:C97206140498FE72BA84EF8D7F20EB0B
                                                                        SHA1:9CDB5D4AB805305AFA4827555874AE1A96454DB7
                                                                        SHA-256:815245B927B93F64ED5792A0C617E3EDD46EE3817A46D4D87F29E5CED2B64568
                                                                        SHA-512:E42232A01F51BA0651FCC956EE56144E78C3F6E98150D19EF59CF22843B386F0E158E2584B76F9606E828ACFFFCF18EDB41954D6798FABA3D7779183703B1F55
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=instance-jqk235-relay.screenconnect.com&amp;p=443&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):1310720
                                                                        Entropy (8bit):0.7067239650709609
                                                                        Encrypted:false
                                                                        SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6VqL:2JIB/wUKUKQncEmYRTwh0n
                                                                        MD5:800227E6216F5325424FD7D33631D5FB
                                                                        SHA1:1D30774BEE925CEF53E4FAB8D49D35DE6836776B
                                                                        SHA-256:BCE52A79C65AE0A5E5695FBA9498C6BF0E0A83D2F714BCA006F7167F6E7ADC39
                                                                        SHA-512:8490C5B33CA01F02583B467257946BC91FF15AFC228FD8945D9C06BC409B94AE5195E5B442A7EFAA29991F7EA2D70FB89E90BB85A3745C0E5749B516386DBE11
                                                                        Malicious:false
                                                                        Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0xd90dbfc3, page size 16384, DirtyShutdown, Windows version 10.0
                                                                        Category:dropped
                                                                        Size (bytes):1310720
                                                                        Entropy (8bit):0.7900237029775234
                                                                        Encrypted:false
                                                                        SSDEEP:1536:LSB2ESB2SSjlK/JvED2y0IEWBqbMo5g5FYkr3g16k42UPkLk+kq+UJ8xUJoU+dzV:LazaPvgurTd42UgSii
                                                                        MD5:227387EFE6D641DB2C120CFA492D5C76
                                                                        SHA1:CEE2A56E3CC00FE93D01624F57DFE4B4057ED1C2
                                                                        SHA-256:35D716B3343B01BCD82A8BDE63064826563042EB5C739265BBDAB8C270FFC2BF
                                                                        SHA-512:F2648B4D388CDBBEFCF3ABB14B805F920E2576BCFC7DCAF899987B96C5F844C593F1F47379D21A79F42123D73818D51F5E068C2E45B3918D2848D3733A137E2C
                                                                        Malicious:false
                                                                        Preview:....... ...............X\...;...{......................0.`.....42...{5......|W.h.b.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........+...{...............................................................................................................................................................................................2...{....................................v......|w.................d..*.....|W..........................#......h.b.....................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):16384
                                                                        Entropy (8bit):0.08217280355946815
                                                                        Encrypted:false
                                                                        SSDEEP:3:Kf//EYeFQt/57Dek3Jh0tglollEqW3l/TjzzQ/t:K3/EzFwR3tuTmd8/
                                                                        MD5:25C30DCEC82BB5A89AA94935B1DEF5F9
                                                                        SHA1:7EF95329A368A1A2D027C5109ADF248928D8D84C
                                                                        SHA-256:564A4DDC9E4DFEBEC3728557E0A048A942F9CC8E937680B76A71FE2763F81909
                                                                        SHA-512:50D91097FC726DA9C46A07061403FB5A87805B8789A9A22B166B49ADB433E16AE98D36F62DE9D00BE5B2500EA9874F9907725840C319AF1540624E10100E584A
                                                                        Malicious:false
                                                                        Preview:.8.Q.....................................;...{.......|W.42...{5.........42...{5.42...{5...Y.42...{59................d..*.....|W.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\Desktop\dMDImIGmc7.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):321
                                                                        Entropy (8bit):5.36509199858051
                                                                        Encrypted:false
                                                                        SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                        MD5:1CF2352B684EF57925D98E766BA897F2
                                                                        SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                        SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                        SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                        Malicious:true
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):746
                                                                        Entropy (8bit):5.349174276064173
                                                                        Encrypted:false
                                                                        SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                        MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                        SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                        SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                        SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                        Malicious:false
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                        Category:modified
                                                                        Size (bytes):1088392
                                                                        Entropy (8bit):7.789940577622617
                                                                        Encrypted:false
                                                                        SSDEEP:24576:QUUGGHn+rUGemcPe9MpKL4Plb2sZWV+tLv0QYu5OPthT+gd:jGHpRPqMpvlqs0O4iO2k
                                                                        MD5:8A8767F589EA2F2C7496B63D8CCC2552
                                                                        SHA1:CC5DE8DD18E7117D8F2520A51EDB1D165CAE64B0
                                                                        SHA-256:0918D8AB2237368A5CEC8CE99261FB07A1A1BEEDA20464C0F91AF0FE3349636B
                                                                        SHA-512:518231213CA955ACDF37B4501FDE9C5B15806D4FC166950EB8706E8D3943947CF85324FAEE806D7DF828485597ECEFFCFA05CA1A5D8AB1BD51ED12DF963A1FE4
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):234
                                                                        Entropy (8bit):4.977464602412109
                                                                        Encrypted:false
                                                                        SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                        MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                        SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                        SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                        SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                        Malicious:false
                                                                        Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):49152
                                                                        Entropy (8bit):4.62694170304723
                                                                        Encrypted:false
                                                                        SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                        MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                        SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                        SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                        SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):36864
                                                                        Entropy (8bit):4.340550904466943
                                                                        Encrypted:false
                                                                        SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                        MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                        SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                        SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                        SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):57344
                                                                        Entropy (8bit):4.657268358041957
                                                                        Encrypted:false
                                                                        SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                        MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                        SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                        SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                        SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):176128
                                                                        Entropy (8bit):5.775360792482692
                                                                        Encrypted:false
                                                                        SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                        MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                        SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                        SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                        SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):548864
                                                                        Entropy (8bit):6.034211651049746
                                                                        Encrypted:false
                                                                        SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                        MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                        SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                        SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                        SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):11776
                                                                        Entropy (8bit):5.273875899788767
                                                                        Encrypted:false
                                                                        SSDEEP:192:V8/Qp6lCJuV3jHXtyVNamVNG1YZfCrMmbfHJ7kjvLjbuLd9NEFbM64:y/cBJaLXt2NaheUrMmb/FkjvLjbuZj64
                                                                        MD5:73A24164D8408254B77F3A2C57A22AB4
                                                                        SHA1:EA0215721F66A93D67019D11C4E588A547CC2AD6
                                                                        SHA-256:D727A640723D192AA3ECE213A173381682041CB28D8BD71781524DBAE3DDBF62
                                                                        SHA-512:650D4320D9246AAECD596AC8B540BF7612EC7A8F60ECAA6E9C27B547B751386222AB926D0C915698D0BB20556475DA507895981C072852804F0B42FDDA02B844
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&...........E... ...`....... ..............................D9....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...4%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1721856
                                                                        Entropy (8bit):6.639085961200334
                                                                        Encrypted:false
                                                                        SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                        MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                        SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                        SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                        SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                        Malicious:false
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                        Process:C:\Users\user\Desktop\dMDImIGmc7.exe
                                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {725BED6F-EB1D-3595-B4AC-1BF7669F9138}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                        Category:dropped
                                                                        Size (bytes):8241152
                                                                        Entropy (8bit):7.950608160690967
                                                                        Encrypted:false
                                                                        SSDEEP:98304:VwJ4t1h0cG5FGJRPxow8OnwJ4t1h0cG5hwJ4t1h0cG5PwJ4t1h0cG5:iWh0cGwGWh0cGkWh0cGGWh0cG
                                                                        MD5:77EA6CC6A1013CE59E66ECDF09C13845
                                                                        SHA1:17B286CCFF817907203F7013049275DA81DCA61B
                                                                        SHA-256:2F11F7F897028602F3DF0AC4767D62A94BA53BDF6642625E37D3386166F3DE9E
                                                                        SHA-512:1B62824AB7F7CBA5136CDC84D2268C331D7BB13A6D645E7463665BC299450AE6C349ECDB6CECB51B2FD99D3A88702B5C2D9E5C4942F49DD444BAF2875126A33F
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {725BED6F-EB1D-3595-B4AC-1BF7669F9138}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                        Category:dropped
                                                                        Size (bytes):8241152
                                                                        Entropy (8bit):7.950608160690967
                                                                        Encrypted:false
                                                                        SSDEEP:98304:VwJ4t1h0cG5FGJRPxow8OnwJ4t1h0cG5hwJ4t1h0cG5PwJ4t1h0cG5:iWh0cGwGWh0cGkWh0cGGWh0cG
                                                                        MD5:77EA6CC6A1013CE59E66ECDF09C13845
                                                                        SHA1:17B286CCFF817907203F7013049275DA81DCA61B
                                                                        SHA-256:2F11F7F897028602F3DF0AC4767D62A94BA53BDF6642625E37D3386166F3DE9E
                                                                        SHA-512:1B62824AB7F7CBA5136CDC84D2268C331D7BB13A6D645E7463665BC299450AE6C349ECDB6CECB51B2FD99D3A88702B5C2D9E5C4942F49DD444BAF2875126A33F
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {725BED6F-EB1D-3595-B4AC-1BF7669F9138}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                        Category:dropped
                                                                        Size (bytes):8241152
                                                                        Entropy (8bit):7.950608160690967
                                                                        Encrypted:false
                                                                        SSDEEP:98304:VwJ4t1h0cG5FGJRPxow8OnwJ4t1h0cG5hwJ4t1h0cG5PwJ4t1h0cG5:iWh0cGwGWh0cGkWh0cGGWh0cG
                                                                        MD5:77EA6CC6A1013CE59E66ECDF09C13845
                                                                        SHA1:17B286CCFF817907203F7013049275DA81DCA61B
                                                                        SHA-256:2F11F7F897028602F3DF0AC4767D62A94BA53BDF6642625E37D3386166F3DE9E
                                                                        SHA-512:1B62824AB7F7CBA5136CDC84D2268C331D7BB13A6D645E7463665BC299450AE6C349ECDB6CECB51B2FD99D3A88702B5C2D9E5C4942F49DD444BAF2875126A33F
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):207360
                                                                        Entropy (8bit):6.573348437503042
                                                                        Encrypted:false
                                                                        SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                        MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                        SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                        SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                        SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                        Malicious:false
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):423501
                                                                        Entropy (8bit):6.577962071975987
                                                                        Encrypted:false
                                                                        SSDEEP:6144:xuH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvH:xuH2anwohwQUv5uH2anwohwQUvH
                                                                        MD5:0BC0F71C1F874FFDADDF8DD54FF1B7AA
                                                                        SHA1:3F02C5B2986CCB14716772C72146470F567F0AF1
                                                                        SHA-256:07C9C5CBF8AEC44D97FA0AAD5D705E20A9BA619CDEF1339E01DAB0086988BE9F
                                                                        SHA-512:3F1D5B62AFA9F860957DEB3EE0799E50C9FC2D39D759EB6C5138033EC58269D92890EF0F4B671D3D66B5E6ADF7CE6D39378D26ABDDAED4B49C1913F7131CFF4A
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIFDD0.tmp, Author: Joe Security
                                                                        Preview:...@IXOS.@.....@IH.Y.@.....@.....@.....@.....@.....@......&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}'.ScreenConnect Client (65d97bc8a263f920)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (65d97bc8a263f920)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{91803B2D-BCE4-4D75-2001-714374EA8E7A}^.C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{BCD3735B-7A0B-F604-901A-84A4EB8DB724}f.C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{B65B3FD6-55AB-3FB4-4975-FA5784A90593}c.C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileMa
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):207360
                                                                        Entropy (8bit):6.573348437503042
                                                                        Encrypted:false
                                                                        SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                        MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                        SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                        SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                        SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                        Malicious:false
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):20480
                                                                        Entropy (8bit):1.172186131595915
                                                                        Encrypted:false
                                                                        SSDEEP:12:JSbX72FjViJAGiLIlHVRpIh/7777777777777777777777777vDHFBz5CmtFd7rz:Jb4QI5wPAwkF
                                                                        MD5:59FE5030A019FAA03C2F01DB75E230ED
                                                                        SHA1:352532E50E8B01D3ABFC3963972F1B42E32C230F
                                                                        SHA-256:617A41697782A130424CFBF83F971F4126CE109D665152DF65043C5CE87FB4D9
                                                                        SHA-512:15EB741388FA9007897F37463F838F532E6ED1969ACFA572F7386358E8740C648619111C1BEDC17C02554BAC17763A7C551CCD5AE720D5CAA627588A071227EE
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):20480
                                                                        Entropy (8bit):1.8073679585733664
                                                                        Encrypted:false
                                                                        SSDEEP:48:Y8Phn7uRc06WXzmjT5jcOBWqcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRr2:nhn71bjTttDpofl6dZgFicGs4Y
                                                                        MD5:FA9EC5742CB34E33BF44B8B893C72105
                                                                        SHA1:972B69A7D994DABBCB6A73891A46C1400D7FED6A
                                                                        SHA-256:BD1132E728B170D74F59C834EF3F39DF9B108505F7F283DB0F6564116F083378
                                                                        SHA-512:FBC7704774726A2F24A0E99AA751BB1A2F255DF339459D3C8E9C460ABF4277EFCC5077B9448A771D5DB18B51DE905396316FDF4E74D241DC00F3D08C3290C71B
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                        Category:dropped
                                                                        Size (bytes):435
                                                                        Entropy (8bit):5.289734780210945
                                                                        Encrypted:false
                                                                        SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                        MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                        SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                        SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                        SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                        Malicious:false
                                                                        Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):360001
                                                                        Entropy (8bit):5.362957460292036
                                                                        Encrypted:false
                                                                        SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaur:zTtbmkExhMJCIpEW
                                                                        MD5:1DD3169BE35B32DEAEF77F30B5D745F1
                                                                        SHA1:6FDC5B01897B5C709B8F4DCE0A6F0D3E6A6FBA15
                                                                        SHA-256:67FFF49E5B5AEC997CC6C67C6D123333EB4C4FB0E38A50BA523FAE7F5E8C71DD
                                                                        SHA-512:BE1A950A0ADF25BA8869734965A5B751E41E5F5D84FE0F30A929BFD584FCFABAF2CF9B6E8C41BA50590AEB5FB72E919D4811E7F991249454729A79C85CB3B2A2
                                                                        Malicious:false
                                                                        Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:JSON data
                                                                        Category:dropped
                                                                        Size (bytes):55
                                                                        Entropy (8bit):4.306461250274409
                                                                        Encrypted:false
                                                                        SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                        MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                        SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                        SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                        SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                        Malicious:false
                                                                        Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.047277569954297
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+TP/vXbAa3xT:2dL9hK6E46YPRNaXXvH
                                                                        MD5:DD5A658325407827DDE52EECC6EEBFC5
                                                                        SHA1:BEF4B9929F01836D26B3E101A66B7BED0DE520B1
                                                                        SHA-256:9C7C056B89A113DE030661044B19EEEBE3AC524DD40CD83827EC75D16DFCB9AE
                                                                        SHA-512:7E5BC48D27762F0E11A4F5BDA2F5723030803D1B3D99BFEB88B988504BFE2F67947C1257A214825D480C1F601EE441FC87661C3B9E4A280BB518C4921E497E27
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a02%3a30</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.045427714712077
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+TM/vXbAa3xT:2dL9hK6E46YPRNaXivH
                                                                        MD5:50CC642C458B844029818422B1F6828D
                                                                        SHA1:E6FAA776E71992722061E84FE5C60A1F4217A13D
                                                                        SHA-256:DAC65FBFFDD4DB5207BCA59E0E1C09172A72C4A5FD7AF974021A398D801828F8
                                                                        SHA-512:699762E8E7E6887F1884417771656345B148464421B282B5B09A12B658F74B203A1DB8A6F04CF805F1013404859B3C7015CA9CFCAD634907FCCCD5D602C3A454
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a02%3a20</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.047901761695051
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+TK/vXbAa3xT:2dL9hK6E46YPRNaXgvH
                                                                        MD5:3227148BB8AB62C253DAB157E9B745F2
                                                                        SHA1:45B254BE63B6682519D9DECF59BA853445F24A2C
                                                                        SHA-256:B9454FB1FC7EBE46485AED54742C22734DFADFE20108B63CDA4CC08D23778A4B
                                                                        SHA-512:8901C02708D795CE206BF9A22F47B7B14E22F29580E459487AE907AD11E10CE5E08D134D6005FDA857F1B78EDF3E466F70421D8C45A06407A0420B3A2FE547BC
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a02%3a26</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.049476563987079
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+cv/vXbAa3xT:2dL9hK6E46YPRNaA3vH
                                                                        MD5:C6767F37E95D470E53D994027AE98C65
                                                                        SHA1:06899BE4E0B49D87438553C52BD1CC3591EF5656
                                                                        SHA-256:10C79BCF3822EF60DD7DD36312E0490BB357F7B93B6CAD46A517C943D109381F
                                                                        SHA-512:6EDBC6F9746D5D20BAB92D31B47905354545C7885AC5B92F5EC6EACA3D4FD2944A723485B7A2BEF9943F4C954DA1BF40B2900AAEACCC3B14F8FDFDB4D5B76D11
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a03%3a05</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.050591043299723
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+e/vXbAa3xT:2dL9hK6E46YPRNa4vH
                                                                        MD5:0AFF277488572C3229DC3D9368077724
                                                                        SHA1:E264CE8B7960A9D1A572FBCCFDAA11E6E10F43C1
                                                                        SHA-256:2462E347462B3F9F0DDD34DE6393AC0EDC0ECF2E3745413EF47093161BF077CE
                                                                        SHA-512:4C3AC6B0909A441F1006FFE0CB5AD5529419B8F742DA249009751162B6837591FECAB62667247AE075E2181874748F2C638336AFF52058BDCE0B394FE586F15E
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a03%3a29</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.048216348183435
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+s5/vXbAa3xT:2dL9hK6E46YPRNa4RvH
                                                                        MD5:8361F294765B2838EF6B5563844BDE3C
                                                                        SHA1:640D5458A978467B8353A409ADB64E1742725256
                                                                        SHA-256:C81E2B3B5A6B1380CC1A7B3CE812FD908AB453A7579C8BBA4385667A04CD6DF8
                                                                        SHA-512:87722745D3D8D3A0EE2E4B0A8277C79436E1FF85A2FF4D52093AD99613DEB9DD57DB39E8E12B6FD61C0DAC2012DEAE5F0477D7B474649733F53CF270EF9D9C71
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a03%3a14</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.048840539924188
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+Aiv/vXbAa3xT:2dL9hK6E46YPRNaj3vH
                                                                        MD5:0DFDDCD7C99C04621C06C6EC9EBC2CE6
                                                                        SHA1:8FB56B7954EA939089822D313D60C6F13EF5E938
                                                                        SHA-256:CA655B5571F441055307ED04D35F352BD6B9C0DA8019FC83B6AFE7AEFFC38989
                                                                        SHA-512:7B24CA2207C84901929A6D7645948E0908D52BAAE4106866A4E8A9736BB7C06E13CC997DC575B3EB5EB37E56E3BE8A9EB1457F2355A3ECFA3CA95E562053C02F
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a04%3a25</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.045427714712077
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+TM/vXbAa3xT:2dL9hK6E46YPRNaXivH
                                                                        MD5:50CC642C458B844029818422B1F6828D
                                                                        SHA1:E6FAA776E71992722061E84FE5C60A1F4217A13D
                                                                        SHA-256:DAC65FBFFDD4DB5207BCA59E0E1C09172A72C4A5FD7AF974021A398D801828F8
                                                                        SHA-512:699762E8E7E6887F1884417771656345B148464421B282B5B09A12B658F74B203A1DB8A6F04CF805F1013404859B3C7015CA9CFCAD634907FCCCD5D602C3A454
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a02%3a20</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.046366492941215
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+T4/vXbAa3xT:2dL9hK6E46YPRNaXuvH
                                                                        MD5:1DDAEDE63ED1454A3604BE43BFEBD384
                                                                        SHA1:DE82213217758F81315201FB71FEAD21A2F8394C
                                                                        SHA-256:F443EC3A172864FD55087267D47EE2B4F1CFDAD399A61F061A9A286A89E3DD6A
                                                                        SHA-512:71D6B208741193D3EA7B80BC90C49DEE7A0167206A08D81F15D10104DD6D6302A6D6D807123693EBB2245E07103E6F6688F31394492F7184E0AD5C2693E0F81C
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a02%3a24</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):584
                                                                        Entropy (8bit):5.05125476857867
                                                                        Encrypted:false
                                                                        SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+E/vXbAa3xT:2dL9hK6E46YPRNaWvH
                                                                        MD5:A2A55CFF21E4574C12A5BAE2421D0D25
                                                                        SHA1:5B498F6698A05804EA1E7EA727F04C25FE6CC8FB
                                                                        SHA-256:54C2A9AE683256F4A8AB7A18254129EA2E5B8C86283FF94E26C54111E2DE2DBC
                                                                        SHA-512:45B0DB9C5B4D9183E65FE94F184D61EB825C8EB973A8A2D53AD3CD139DAD8E5820D4507D7A284ED54793C22D65FF0CAE18EE57ACD2E9A3A5163386A5D0F02676
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a03%3a49</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):20480
                                                                        Entropy (8bit):1.8073679585733664
                                                                        Encrypted:false
                                                                        SSDEEP:48:Y8Phn7uRc06WXzmjT5jcOBWqcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRr2:nhn71bjTttDpofl6dZgFicGs4Y
                                                                        MD5:FA9EC5742CB34E33BF44B8B893C72105
                                                                        SHA1:972B69A7D994DABBCB6A73891A46C1400D7FED6A
                                                                        SHA-256:BD1132E728B170D74F59C834EF3F39DF9B108505F7F283DB0F6564116F083378
                                                                        SHA-512:FBC7704774726A2F24A0E99AA751BB1A2F255DF339459D3C8E9C460ABF4277EFCC5077B9448A771D5DB18B51DE905396316FDF4E74D241DC00F3D08C3290C71B
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF2DFC37B136EBC2C8.TMP, Author: Joe Security
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):512
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3::
                                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                        Malicious:false
                                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):1.4252976641368025
                                                                        Encrypted:false
                                                                        SSDEEP:48:n4/7usrh8FXzBT5aUOcOBWqcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRrDq:4/7wvTohtDpofl6dZgFicGs4Y
                                                                        MD5:7731FC991B3629B74F2975B44C25198B
                                                                        SHA1:F293788DB5283958D19D2B03E289F3C428C914FC
                                                                        SHA-256:EB946E83CC865135ADDEA33BC8374590455884D52A7614A9C34B1916AA29A854
                                                                        SHA-512:701899CE50675CF13492F763EE194D25763D917F38D8FF772BD8890F51F4117FA03EEC2E76372B98F051BBAA0E23BA74760AA0A5DB293DC96956E21632DF80F9
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF470C7A0A2610DFDB.TMP, Author: Joe Security
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):1.4252976641368025
                                                                        Encrypted:false
                                                                        SSDEEP:48:n4/7usrh8FXzBT5aUOcOBWqcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRrDq:4/7wvTohtDpofl6dZgFicGs4Y
                                                                        MD5:7731FC991B3629B74F2975B44C25198B
                                                                        SHA1:F293788DB5283958D19D2B03E289F3C428C914FC
                                                                        SHA-256:EB946E83CC865135ADDEA33BC8374590455884D52A7614A9C34B1916AA29A854
                                                                        SHA-512:701899CE50675CF13492F763EE194D25763D917F38D8FF772BD8890F51F4117FA03EEC2E76372B98F051BBAA0E23BA74760AA0A5DB293DC96956E21632DF80F9
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF500630DB60D35AD6.TMP, Author: Joe Security
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):1.4252976641368025
                                                                        Encrypted:false
                                                                        SSDEEP:48:n4/7usrh8FXzBT5aUOcOBWqcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRrDq:4/7wvTohtDpofl6dZgFicGs4Y
                                                                        MD5:7731FC991B3629B74F2975B44C25198B
                                                                        SHA1:F293788DB5283958D19D2B03E289F3C428C914FC
                                                                        SHA-256:EB946E83CC865135ADDEA33BC8374590455884D52A7614A9C34B1916AA29A854
                                                                        SHA-512:701899CE50675CF13492F763EE194D25763D917F38D8FF772BD8890F51F4117FA03EEC2E76372B98F051BBAA0E23BA74760AA0A5DB293DC96956E21632DF80F9
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF58819F7730A4E8E0.TMP, Author: Joe Security
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):69632
                                                                        Entropy (8bit):0.23717558832942418
                                                                        Encrypted:false
                                                                        SSDEEP:48:wVEDBAdu9S3qcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRrVxcO:WWxpofl6dZgFicGsHx
                                                                        MD5:E4866781CFD28DF39CC2576E993CDC54
                                                                        SHA1:84E4A8E45D1759988BBB7A091CD80C5C1C0E6862
                                                                        SHA-256:D4EFB27936EDEEFF004404DCE44E9ECF234CB3C6E78BA9D831B907CE06A9007C
                                                                        SHA-512:D3298B1C0F057B22678D02747BB30C1CFA305EF8851B1371999DF2F917AE3A8C074586FF5F784023D6CE3558689B9A2FD84C6B9648631BF4B5714EA1A2A5DBEC
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF638D1B817E631DF7.TMP, Author: Joe Security
                                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):512
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3::
                                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                        Malicious:false
                                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:modified
                                                                        Size (bytes):512
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3::
                                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                        Malicious:false
                                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):20480
                                                                        Entropy (8bit):1.8073679585733664
                                                                        Encrypted:false
                                                                        SSDEEP:48:Y8Phn7uRc06WXzmjT5jcOBWqcq56Adu9SijyI6daxkUqUZ/SoTeiprT4JaGHMRr2:nhn71bjTttDpofl6dZgFicGs4Y
                                                                        MD5:FA9EC5742CB34E33BF44B8B893C72105
                                                                        SHA1:972B69A7D994DABBCB6A73891A46C1400D7FED6A
                                                                        SHA-256:BD1132E728B170D74F59C834EF3F39DF9B108505F7F283DB0F6564116F083378
                                                                        SHA-512:FBC7704774726A2F24A0E99AA751BB1A2F255DF339459D3C8E9C460ABF4277EFCC5077B9448A771D5DB18B51DE905396316FDF4E74D241DC00F3D08C3290C71B
                                                                        Malicious:false
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFAC928A1F31CE2CD0.TMP, Author: Joe Security
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):0.07728883712617902
                                                                        Encrypted:false
                                                                        SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOBz5CTqtJS4zASKChiVky6l51:2F0i8n0itFzDHFBz5CmtFd7r
                                                                        MD5:390CAC7A4D0B0DA3E5028952BC5302AC
                                                                        SHA1:2EA1A7763210D8BCC550447822443109B79184EE
                                                                        SHA-256:93B79C64580A28E94FF307C426A3125368DC4AE41ABE270AD1A8F834A3B0A752
                                                                        SHA-512:61C71628E3A1C6288E5AECA925D6ED7F188B21D7B48EC519874EE6E93561018C4B5877FFE12F50A32734385D95F806A30EF9D881FCC6CC7328C9BEAD65069178
                                                                        Malicious:false
                                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):512
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3::
                                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                        Malicious:false
                                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):512
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3::
                                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                        Malicious:false
                                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):7.429445154057834
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:dMDImIGmc7.exe
                                                                        File size:5'620'136 bytes
                                                                        MD5:4221ca1a9f9f6e0c9b9ddd58e2c2f863
                                                                        SHA1:812eda18b362a8f6cdc7aad46967fba7782427d2
                                                                        SHA256:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085
                                                                        SHA512:80dc113d8ea89a403c7d68668a935821d79b0002e96f5ea4d3bb9f365035f4818dad047364c7b237b0c1a152a178483299d68dd41ea379daa1ffb8396014cb70
                                                                        SSDEEP:49152:0EEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:9Es6efPNwJ4t1h0cG5FGJRPxow8O
                                                                        TLSH:B346E111B3DA95B9D4BF063CD87A82699A74BC044712C7EF53D4BD2D2D32BC05A323A6
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                        Icon Hash:00928e8e8686b000
                                                                        Entrypoint:0x4014ad
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:true
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:5
                                                                        OS Version Minor:1
                                                                        File Version Major:5
                                                                        File Version Minor:1
                                                                        Subsystem Version Major:5
                                                                        Subsystem Version Minor:1
                                                                        Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                        Signature Valid:true
                                                                        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                        Signature Validation Error:The operation completed successfully
                                                                        Error Number:0
                                                                        Not Before, Not After
                                                                        • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                        Subject Chain
                                                                        • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                        Version:3
                                                                        Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                        Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                        Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                        Serial:0B9360051BCCF66642998998D5BA97CE
                                                                        Instruction
                                                                        call 00007FFB8085A49Ah
                                                                        jmp 00007FFB80859F4Fh
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push 00000000h
                                                                        call dword ptr [0040D040h]
                                                                        push dword ptr [ebp+08h]
                                                                        call dword ptr [0040D03Ch]
                                                                        push C0000409h
                                                                        call dword ptr [0040D044h]
                                                                        push eax
                                                                        call dword ptr [0040D048h]
                                                                        pop ebp
                                                                        ret
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        sub esp, 00000324h
                                                                        push 00000017h
                                                                        call dword ptr [0040D04Ch]
                                                                        test eax, eax
                                                                        je 00007FFB8085A0D7h
                                                                        push 00000002h
                                                                        pop ecx
                                                                        int 29h
                                                                        mov dword ptr [004148D8h], eax
                                                                        mov dword ptr [004148D4h], ecx
                                                                        mov dword ptr [004148D0h], edx
                                                                        mov dword ptr [004148CCh], ebx
                                                                        mov dword ptr [004148C8h], esi
                                                                        mov dword ptr [004148C4h], edi
                                                                        mov word ptr [004148F0h], ss
                                                                        mov word ptr [004148E4h], cs
                                                                        mov word ptr [004148C0h], ds
                                                                        mov word ptr [004148BCh], es
                                                                        mov word ptr [004148B8h], fs
                                                                        mov word ptr [004148B4h], gs
                                                                        pushfd
                                                                        pop dword ptr [004148E8h]
                                                                        mov eax, dword ptr [ebp+00h]
                                                                        mov dword ptr [004148DCh], eax
                                                                        mov eax, dword ptr [ebp+04h]
                                                                        mov dword ptr [004148E0h], eax
                                                                        lea eax, dword ptr [ebp+08h]
                                                                        mov dword ptr [004148ECh], eax
                                                                        mov eax, dword ptr [ebp-00000324h]
                                                                        mov dword ptr [00414828h], 00010001h
                                                                        Programming Language:
                                                                        • [IMP] VS2008 SP1 build 30729
                                                                        • [IMP] VS2008 build 21022
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533074.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x15fa8
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rsrc0x160000x5330740x533200d813d73373778ed5b0a4b71b252379ebunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        FILES0x163d40x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3962220149253731
                                                                        FILES0x9c3d40x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111589431762695
                                                                        FILES0x2409d40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415066442757009
                                                                        FILES0x25b5d40x2ec318PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9810924530029297
                                                                        FILES0x5478ec0x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                        RT_MANIFEST0x548eec0x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                        DLLImport
                                                                        mscoree.dllCorBindToRuntimeEx
                                                                        KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                        OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 10, 2024 15:02:21.181423903 CET49725443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:21.181467056 CET44349725147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:21.181741953 CET49725443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:22.564940929 CET49725443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:22.564969063 CET44349725147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:22.565047026 CET44349725147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:25.124557018 CET49734443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:25.124617100 CET44349734147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:25.124849081 CET49734443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:25.128021002 CET49734443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:25.128037930 CET44349734147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:25.128087997 CET44349734147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:27.613266945 CET49745443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:27.613306046 CET44349745147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:27.613672018 CET49745443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:27.616844893 CET49745443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:27.616861105 CET44349745147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:27.616913080 CET44349745147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:31.527180910 CET49756443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:31.527236938 CET44349756147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:31.527462959 CET49756443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:31.531192064 CET49756443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:31.531214952 CET44349756147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:31.531394005 CET44349756147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:36.455306053 CET49772443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:36.455358982 CET44349772147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:36.455440998 CET49772443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:36.457990885 CET49772443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:36.458015919 CET44349772147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:36.458055973 CET44349772147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:45.075256109 CET49792443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:45.075269938 CET44349792147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:45.075354099 CET49792443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:45.077740908 CET49792443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:02:45.077754021 CET44349792147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:02:45.077795029 CET44349792147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:00.165591002 CET49826443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:00.165602922 CET44349826147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:00.165679932 CET49826443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:00.168263912 CET49826443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:00.168275118 CET44349826147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:00.168324947 CET44349826147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:20.949958086 CET49877443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:20.950005054 CET44349877147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:20.950092077 CET49877443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:20.952986956 CET49877443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:20.953000069 CET44349877147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:20.953041077 CET44349877147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:57.012474060 CET49959443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:57.012525082 CET44349959147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:57.012610912 CET49959443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:57.015028954 CET49959443192.168.2.7147.28.146.16
                                                                        Dec 10, 2024 15:03:57.015050888 CET44349959147.28.146.16192.168.2.7
                                                                        Dec 10, 2024 15:03:57.015095949 CET44349959147.28.146.16192.168.2.7
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 10, 2024 15:02:20.814711094 CET5618753192.168.2.71.1.1.1
                                                                        Dec 10, 2024 15:02:21.151532888 CET53561871.1.1.1192.168.2.7
                                                                        Dec 10, 2024 15:02:59.830204964 CET5086053192.168.2.71.1.1.1
                                                                        Dec 10, 2024 15:03:00.154429913 CET53508601.1.1.1192.168.2.7
                                                                        Dec 10, 2024 15:03:56.658364058 CET5390853192.168.2.71.1.1.1
                                                                        Dec 10, 2024 15:03:57.000670910 CET53539081.1.1.1192.168.2.7
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Dec 10, 2024 15:02:20.814711094 CET192.168.2.71.1.1.10x8dc9Standard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                        Dec 10, 2024 15:02:59.830204964 CET192.168.2.71.1.1.10xb863Standard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                        Dec 10, 2024 15:03:56.658364058 CET192.168.2.71.1.1.10xa4bcStandard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Dec 10, 2024 15:02:11.388587952 CET1.1.1.1192.168.2.70xaf73No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                        Dec 10, 2024 15:02:11.388587952 CET1.1.1.1192.168.2.70xaf73No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                                        Dec 10, 2024 15:02:21.151532888 CET1.1.1.1192.168.2.70x8dc9No error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                        Dec 10, 2024 15:02:21.151532888 CET1.1.1.1192.168.2.70x8dc9No error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false
                                                                        Dec 10, 2024 15:03:00.154429913 CET1.1.1.1192.168.2.70xb863No error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                        Dec 10, 2024 15:03:00.154429913 CET1.1.1.1192.168.2.70xb863No error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false
                                                                        Dec 10, 2024 15:03:57.000670910 CET1.1.1.1192.168.2.70xa4bcNo error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                        Dec 10, 2024 15:03:57.000670910 CET1.1.1.1192.168.2.70xa4bcNo error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:09:02:13
                                                                        Start date:10/12/2024
                                                                        Path:C:\Users\user\Desktop\dMDImIGmc7.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\dMDImIGmc7.exe"
                                                                        Imagebase:0xad0000
                                                                        File size:5'620'136 bytes
                                                                        MD5 hash:4221CA1A9F9F6E0C9B9DDD58E2C2F863
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1393151526.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1334615564.0000000000AE6000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:09:02:13
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"
                                                                        Imagebase:0x920000
                                                                        File size:59'904 bytes
                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:09:02:14
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\System32\msiexec.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\msiexec.exe /V
                                                                        Imagebase:0x7ff60b630000
                                                                        File size:69'632 bytes
                                                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:4
                                                                        Start time:09:02:14
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding BE66020F81508C3F8258167FE81C4454 C
                                                                        Imagebase:0x920000
                                                                        File size:59'904 bytes
                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:09:02:15
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:rundll32.exe "C:\Users\user~1\AppData\Local\Temp\MSIF592.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5568687 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                        Imagebase:0x7e0000
                                                                        File size:61'440 bytes
                                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:09:02:16
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding EF27ABBBD28DFDC71F243553BD80169A
                                                                        Imagebase:0x920000
                                                                        File size:59'904 bytes
                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:09:02:17
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 84FED5A02A4478A6BB5B277844992BE5 E Global\MSI0000
                                                                        Imagebase:0x920000
                                                                        File size:59'904 bytes
                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:09:02:18
                                                                        Start date:10/12/2024
                                                                        Path:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=b6c7f42a-9f77-4056-ac17-baae7e96c3ca&k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE"
                                                                        Imagebase:0x7a0000
                                                                        File size:95'512 bytes
                                                                        MD5 hash:75B21D04C69128A7230A0998086B61AA
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:moderate
                                                                        Has exited:false

                                                                        Target ID:9
                                                                        Start time:09:02:20
                                                                        Start date:10/12/2024
                                                                        Path:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "a91f678a-772f-4588-8776-9c2dc2738ecd" "User"
                                                                        Imagebase:0x2b0000
                                                                        File size:602'392 bytes
                                                                        MD5 hash:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1406701150.00000000002B2000.00000002.00000001.01000000.00000012.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2598425773.0000000002511000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:moderate
                                                                        Has exited:false

                                                                        Target ID:10
                                                                        Start time:09:02:23
                                                                        Start date:10/12/2024
                                                                        Path:C:\Windows\System32\svchost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                        Imagebase:0x7ff7b4ee0000
                                                                        File size:55'320 bytes
                                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:15.8%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:20%
                                                                          Total number of Nodes:25
                                                                          Total number of Limit Nodes:1
                                                                          execution_graph 28672 17c18d8 28673 17c18e8 28672->28673 28676 17c19e0 28673->28676 28674 17c1935 28677 17c19fb 28676->28677 28680 17c41f0 28676->28680 28685 17c41e0 28676->28685 28677->28674 28681 17c420f 28680->28681 28682 17c43ed 28681->28682 28690 5b514b0 28681->28690 28694 5b514c0 28681->28694 28686 17c420f 28685->28686 28687 17c43ed 28686->28687 28688 5b514b0 RtlGetVersion 28686->28688 28689 5b514c0 RtlGetVersion 28686->28689 28688->28687 28689->28687 28691 5b514c0 28690->28691 28692 5b514d4 28691->28692 28698 5b52d07 28691->28698 28692->28682 28695 5b514c5 28694->28695 28696 5b514d4 28695->28696 28697 5b52d07 RtlGetVersion 28695->28697 28696->28682 28697->28696 28699 5b52d0d 28698->28699 28700 5b52f0c RtlGetVersion 28699->28700 28701 5b52e2c 28699->28701 28702 5b52fca 28700->28702 28701->28692 28702->28692

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 66 5b52d07-5b52d0b 67 5b52d0d-5b52d76 66->67 68 5b52d7a-5b52de6 66->68 67->68 77 5b52e58-5b52e6d 68->77 78 5b52de8-5b52dfc 68->78 87 5b52ead 77->87 88 5b52e6f-5b52e8b 77->88 83 5b52e02 78->83 84 5b52dfe-5b52e00 78->84 85 5b52e05-5b52e26 call 5b52560 83->85 84->85 96 5b52e2c-5b52e57 85->96 97 5b52ef8-5b52fc8 RtlGetVersion 85->97 93 5b52eb2-5b52ec8 87->93 101 5b52e95-5b52eab 88->101 102 5b52e8d 88->102 95 5b52eca-5b52ece 93->95 99 5b52ed0 95->99 100 5b52ed9 95->100 109 5b52fd1-5b53014 97->109 110 5b52fca-5b52fd0 97->110 99->100 100->97 101->95 102->101 114 5b53016 109->114 115 5b5301b-5b53022 109->115 110->109 114->115
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1392852591.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b50000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRq$`Qq$`Qq
                                                                          • API String ID: 0-1304978167
                                                                          • Opcode ID: 098586f3bff6d745ca20a9869b81bb304bb8e9009efb9b70410e766c38b29090
                                                                          • Instruction ID: 2fcedc3a14a1bd1fef244145c78c4e7cf8db7bf44606ae6a5a629a059477ace0
                                                                          • Opcode Fuzzy Hash: 098586f3bff6d745ca20a9869b81bb304bb8e9009efb9b70410e766c38b29090
                                                                          • Instruction Fuzzy Hash: 50810271A0A3548FEB159B78D8247EDBFB2FF46210F0540EAD404EB291DB34AD49CB96

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 116 5b5ba30-5b5bad2 call 5b5ba30 call 5b5b318 * 2 call 5b5a9b8 131 5b5bbb4-5b5bbbe 116->131 132 5b5bad8-5b5bada 116->132 133 5b5bae0-5b5bae6 132->133 134 5b5bbbf-5b5bc1f 132->134 135 5b5bc26-5b5bc55 133->135 136 5b5baec-5b5bafe 133->136 134->135 144 5b5bc57-5b5bcb0 135->144 141 5b5bb70-5b5bbae call 5b5b794 136->141 142 5b5bb00-5b5bb68 136->142 141->131 141->132 142->141 164 5b5bcb2-5b5bcc3 144->164 165 5b5bcc9-5b5bcca 144->165 164->165 165->144 166 5b5bccc-5b5bcec 165->166 169 5b5bda0-5b5bda9 166->169 170 5b5bdb4-5b5bdbb 169->170 171 5b5bdab-5b5bdae 169->171 173 5b5bdc1-5b5be00 call 5b5b318 170->173 174 5b5bf9f-5b5bfa8 170->174 171->170 172 5b5bcf1-5b5bcfd 171->172 175 5b5bd03-5b5bd1c 172->175 176 5b5bfa9-5b5bff4 172->176 194 5b5be02-5b5be07 173->194 195 5b5be09-5b5be16 173->195 180 5b5bd93-5b5bd9d 175->180 181 5b5bd1e-5b5bd8b 175->181 196 5b5bffe-5b5c01d 176->196 180->169 181->180 198 5b5be19-5b5be56 call 5b5a9b8 194->198 195->198 204 5b5c023-5b5c042 196->204 205 5b5c1bd-5b5c1c7 196->205 210 5b5bf90-5b5bf99 198->210 208 5b5c044-5b5c0a3 call 5b5b318 204->208 209 5b5c0ab-5b5c0ba 204->209 208->209 209->205 215 5b5c0c0-5b5c0f9 209->215 210->174 211 5b5be5b-5b5be9a 210->211 227 5b5bf11-5b5bf66 211->227 228 5b5be9c-5b5bf09 211->228 215->205 226 5b5c0ff-5b5c102 215->226 226->205 230 5b5c108-5b5c10b 226->230 227->210 241 5b5bf68-5b5bf6a 227->241 228->227 232 5b5c10d-5b5c111 230->232 233 5b5c129-5b5c13b 230->233 235 5b5c113-5b5c117 232->235 236 5b5c11f-5b5c123 232->236 242 5b5c13d-5b5c1a0 233->242 243 5b5c1a8-5b5c1b7 233->243 235->236 236->233 239 5b5c1c8-5b5c20f 236->239 241->210 244 5b5bf6c-5b5bf8b 241->244 242->243 243->205 243->215 244->174 256 5b5bf8d 244->256 256->210
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1392852591.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b50000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'q$4'q$4'q$4'q$4'q
                                                                          • API String ID: 0-3272727544
                                                                          • Opcode ID: 642562bf18e5c3ac3622f4f0abd5af97523f0042adb4f9612ff8ac7db8eda776
                                                                          • Instruction ID: cffa725da9e8feb67f1b67ac85860d27a5bc2a86d6c9e414f0941051d7ba940f
                                                                          • Opcode Fuzzy Hash: 642562bf18e5c3ac3622f4f0abd5af97523f0042adb4f9612ff8ac7db8eda776
                                                                          • Instruction Fuzzy Hash: 66427174A006058FCB18DF69D490AAEBBF2FF88320B14856DE4169B7A5DB34ED45CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 492 5b587b8-5b58803 call 5b53690 636 5b58805 call 5b59430 492->636 637 5b58805 call 5b54e40 492->637 638 5b58805 call 5b587b8 492->638 639 5b58805 call 5b587a8 492->639 496 5b5880b-5b5886d call 5b5a0d1 643 5b5886f call 5b5f455 496->643 644 5b5886f call 5b5f53e 496->644 502 5b58875-5b588df 648 5b588e1 call 5b72c81 502->648 649 5b588e1 call 5b72c90 502->649 508 5b588e7-5b5892b 640 5b5892d call 5b72c81 508->640 641 5b5892d call 5b72c90 508->641 512 5b58933-5b589d4 519 5b59425-5b5943c 512->519 520 5b589da-5b58a0f 512->520 524 5b5943e-5b5946a 519->524 525 5b5946b-5b594c5 call 5b54e40 call 5b59b38 519->525 520->519 523 5b58a15-5b58a4a 520->523 523->519 529 5b58a50-5b58a85 523->529 524->525 540 5b594cb-5b59514 525->540 529->519 533 5b58a8b-5b58ac0 529->533 533->519 537 5b58ac6-5b58afb 533->537 537->519 541 5b58b01-5b58b1c 537->541 544 5b58b22-5b58b4e 541->544 545 5b58bab-5b58bbe 541->545 551 5b58b50-5b58b94 544->551 552 5b58b9c-5b58ba5 544->552 547 5b58bd7-5b58be6 545->547 548 5b58bc0-5b58bd5 545->548 549 5b58bec-5b58bf2 547->549 548->549 634 5b58bf4 call 5b7370f 549->634 635 5b58bf4 call 5b749ea 549->635 551->552 552->544 552->545 554 5b58bfa-5b58c13 555 5b58c15-5b58c8c 554->555 556 5b58c8e-5b58cab 554->556 555->556 561 5b58cad-5b58cc2 555->561 558 5b58cc8-5b59013 556->558 607 5b591ad-5b591c9 558->607 608 5b59019-5b5914e 558->608 561->558 610 5b591d7 607->610 611 5b591cb 607->611 646 5b59150 call 5b72c81 608->646 647 5b59150 call 5b72c90 608->647 610->519 611->610 629 5b59156-5b59191 650 5b59193 call 5b74c90 629->650 651 5b59193 call 5b74c50 629->651 632 5b59199-5b591a7 632->607 632->608 634->554 635->554 636->496 637->496 638->496 639->496 640->512 641->512 643->502 644->502 646->629 647->629 648->508 649->508 650->632 651->632
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1392852591.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b50000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID: 0-3916222277
                                                                          • Opcode ID: 45c51ae54eaf8b06d56391c529b816a4ab0c17217e0d5d89ad288d8c52e8182b
                                                                          • Instruction ID: e9f5de21fcb8dac2432a69e0c871a6d4d27f3914b1dffd7d793c8b0a44c28859
                                                                          • Opcode Fuzzy Hash: 45c51ae54eaf8b06d56391c529b816a4ab0c17217e0d5d89ad288d8c52e8182b
                                                                          • Instruction Fuzzy Hash: FB624A34A00319CFDB259F64D848B9DBBB2FF99310F148199E909A7364DB35AD86CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 652 5b587a8-5b58803 call 5b53690 803 5b58805 call 5b59430 652->803 804 5b58805 call 5b54e40 652->804 805 5b58805 call 5b587b8 652->805 806 5b58805 call 5b587a8 652->806 657 5b5880b-5b5886d call 5b5a0d1 810 5b5886f call 5b5f455 657->810 811 5b5886f call 5b5f53e 657->811 663 5b58875-5b588df 797 5b588e1 call 5b72c81 663->797 798 5b588e1 call 5b72c90 663->798 669 5b588e7-5b5892b 807 5b5892d call 5b72c81 669->807 808 5b5892d call 5b72c90 669->808 673 5b58933-5b589d4 680 5b59425-5b5943c 673->680 681 5b589da-5b58a0f 673->681 685 5b5943e-5b5946a 680->685 686 5b5946b-5b594c5 call 5b54e40 call 5b59b38 680->686 681->680 684 5b58a15-5b58a4a 681->684 684->680 690 5b58a50-5b58a85 684->690 685->686 701 5b594cb-5b59514 686->701 690->680 694 5b58a8b-5b58ac0 690->694 694->680 698 5b58ac6-5b58afb 694->698 698->680 702 5b58b01-5b58b1c 698->702 705 5b58b22-5b58b4e 702->705 706 5b58bab-5b58bbe 702->706 712 5b58b50-5b58b94 705->712 713 5b58b9c-5b58ba5 705->713 708 5b58bd7-5b58be6 706->708 709 5b58bc0-5b58bd5 706->709 710 5b58bec-5b58bf2 708->710 709->710 801 5b58bf4 call 5b7370f 710->801 802 5b58bf4 call 5b749ea 710->802 712->713 713->705 713->706 715 5b58bfa-5b58c13 716 5b58c15-5b58c8c 715->716 717 5b58c8e-5b58cab 715->717 716->717 722 5b58cad-5b58cc2 716->722 719 5b58cc8-5b59013 717->719 768 5b591ad-5b591c9 719->768 769 5b59019-5b5914e 719->769 722->719 771 5b591d7 768->771 772 5b591cb 768->772 795 5b59150 call 5b72c81 769->795 796 5b59150 call 5b72c90 769->796 771->680 772->771 790 5b59156-5b59191 799 5b59193 call 5b74c90 790->799 800 5b59193 call 5b74c50 790->800 793 5b59199-5b591a7 793->768 793->769 795->790 796->790 797->669 798->669 799->793 800->793 801->715 802->715 803->657 804->657 805->657 806->657 807->673 808->673 810->663 811->663
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1392852591.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b50000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID: 0-3916222277
                                                                          • Opcode ID: 79fc7739685bd161b27af7a90a93350eee7056060bf962847afba20e9861f69b
                                                                          • Instruction ID: fad2caba3b46fe2f6f3e429251a905e4baf0ac5e51b51ab255975217a1d61d48
                                                                          • Opcode Fuzzy Hash: 79fc7739685bd161b27af7a90a93350eee7056060bf962847afba20e9861f69b
                                                                          • Instruction Fuzzy Hash: 4C423C34A00318CFDB25DF64D849B9DBBB2FB99310F148199E909A7364CB75AD82CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 813 5b71e9b-5b71ec6 814 5b71f3a-5b71f3d 813->814 815 5b71ec8-5b71f28 813->815 816 5b72032-5b7204a 814->816 820 5b71f31 815->820 821 5b71f2a-5b71f2f 815->821 817 5b72050-5b72058 816->817 818 5b71f4e-5b72015 816->818 947 5b7205b call 5b5b7c9 817->947 948 5b7205b call 5b5b82a 817->948 856 5b72017-5b72019 818->856 857 5b7201b-5b72027 818->857 824 5b71f34-5b71f37 820->824 821->824 823 5b72060-5b7209b 831 5b720a1-5b720a4 823->831 832 5b72189-5b7219d 823->832 824->814 834 5b720a6-5b720bb 831->834 835 5b720f5-5b720f8 831->835 853 5b72257-5b72274 832->853 854 5b721a3-5b721c2 832->854 836 5b720bd-5b720c2 834->836 837 5b720ca-5b720d6 834->837 838 5b7212c-5b72135 835->838 839 5b720fa-5b7210b 835->839 836->837 841 5b72590-5b725b3 837->841 842 5b720dc-5b720e6 837->842 844 5b72137-5b7213c 838->844 845 5b72144-5b72150 838->845 839->838 843 5b7210d-5b72126 839->843 842->841 847 5b720ec-5b720f0 842->847 843->838 844->845 845->841 849 5b72156-5b72173 845->849 850 5b72179-5b72183 847->850 849->850 850->831 850->832 867 5b723fa-5b72408 853->867 868 5b7227a-5b7228c 853->868 872 5b721c4-5b72236 854->872 873 5b7223e-5b72251 854->873 860 5b7202a-5b7202c 856->860 857->860 860->816 863 5b7202e-5b72031 860->863 863->816 870 5b72410-5b72475 867->870 868->867 878 5b72292-5b72309 868->878 891 5b724c3-5b724e0 870->891 872->873 873->853 873->854 917 5b7230f-5b72392 878->917 918 5b72398-5b723f8 878->918 897 5b724e2 891->897 898 5b724e8-5b724fd 891->898 900 5b72477-5b724c0 897->900 901 5b724e4-5b724e6 897->901 904 5b724ff-5b7255b 898->904 905 5b7255d-5b7258f 898->905 900->891 901->898 901->900 904->905 917->918 918->870 947->823 948->823
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'q
                                                                          • API String ID: 0-1807707664
                                                                          • Opcode ID: 728c433b5019d0f9385017c177426b82869a0f34ee8090e7933055ded1808d41
                                                                          • Instruction ID: 706c3f5f6e51f65544db461c8df6870a50b0e136643ffdb0462e5c3d80c04cb0
                                                                          • Opcode Fuzzy Hash: 728c433b5019d0f9385017c177426b82869a0f34ee8090e7933055ded1808d41
                                                                          • Instruction Fuzzy Hash: C422E434B002148FDB69DB38C594B6DB7F2EF89215F1585A8E51A9B3A1DB31ED82CF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 12fadfa912e205217ff309b885650540b3e5f4a02e50c4b0216d191990f47880
                                                                          • Instruction ID: 143aa8e89f87e433db8da3454168c2f72fc2bbd164795270ae60a01e820a3335
                                                                          • Opcode Fuzzy Hash: 12fadfa912e205217ff309b885650540b3e5f4a02e50c4b0216d191990f47880
                                                                          • Instruction Fuzzy Hash: D3C20A74A002089FDB14DF68C894AADBBB2FF89310F158199E959AB3A5DB70FD41CF50

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 5b70848-5b70872 2 5b70874-5b7088e 0->2 3 5b70891-5b7089d 0->3 6 5b708c0-5b708cc 3->6 7 5b7089f-5b708bd 3->7 11 5b709d5-5b709e1 6->11 12 5b708d2-5b708d7 6->12 20 5b709e3-5b709e9 11->20 21 5b70a21-5b70a6c 11->21 14 5b708f5 12->14 15 5b708d9-5b708df 12->15 16 5b708f7-5b7090f 14->16 18 5b708e5-5b708f1 15->18 19 5b708e1-5b708e3 15->19 27 5b70915-5b7091e 16->27 28 5b709bf-5b709d2 16->28 22 5b708f3 18->22 19->22 24 5b709f7-5b70a1e 20->24 25 5b709eb-5b709ed 20->25 46 5b70a74-5b70a8c 21->46 47 5b70a6e 21->47 22->16 25->24 34 5b70920-5b70926 27->34 35 5b7093c 27->35 37 5b7092c-5b70938 34->37 38 5b70928-5b7092a 34->38 39 5b7093e-5b7097b call 5b70848 * 2 35->39 40 5b7093a 37->40 38->40 55 5b70981-5b7099a 39->55 40->39 62 5b70a8e call 5b70ab7 46->62 63 5b70a8e call 5b70ac8 46->63 49 5b70a70-5b70a72 47->49 50 5b70a99-5b70ab4 47->50 49->46 49->50 54 5b70a94-5b70a98 57 5b709b4-5b709b8 55->57 58 5b7099c-5b709a2 55->58 57->28 59 5b709a6-5b709b2 58->59 60 5b709a4 58->60 59->57 60->57 62->54 63->54
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $q$$q$$q$$q$$q$$q$$q
                                                                          • API String ID: 0-1555874908
                                                                          • Opcode ID: 3bd2fef01d917b4619c3589bd1f2ff7a586b14443f68ad2636be8b1217c2744e
                                                                          • Instruction ID: 084440b715bd2c361920fc0ae2f3381ff89c30c25cdea4e4c1b6d666b6a5f13b
                                                                          • Opcode Fuzzy Hash: 3bd2fef01d917b4619c3589bd1f2ff7a586b14443f68ad2636be8b1217c2744e
                                                                          • Instruction Fuzzy Hash: F8712871B002199FDB25AB69A81467EBBB2FFC8710B24446BD85597340DF31E802CBD1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 261 17c7a30-17c7a7f 266 17c7abd-17c7ad5 261->266 267 17c7a81-17c7a95 261->267 272 17c7ad7-17c7aeb 266->272 273 17c7b13-17c7b2b 266->273 270 17c7a9e-17c7abb 267->270 271 17c7a97 267->271 270->266 271->270 277 17c7aed 272->277 278 17c7af4-17c7b11 272->278 279 17c7b2d-17c7b41 273->279 280 17c7b69-17c7b8e 273->280 277->278 278->273 285 17c7b4a-17c7b67 279->285 286 17c7b43 279->286 290 17c7bcc-17c7c05 280->290 291 17c7b90-17c7ba4 280->291 285->280 286->285 302 17c7c07-17c7c1b 290->302 303 17c7c43-17c7c7c 290->303 295 17c7bad-17c7bca 291->295 296 17c7ba6 291->296 295->290 296->295 306 17c7c1d 302->306 307 17c7c24-17c7c41 302->307 313 17c7c7e-17c7c92 303->313 314 17c7cba-17c7cc9 303->314 306->307 307->303 317 17c7c9b-17c7cb8 313->317 318 17c7c94 313->318 317->314 318->317
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: #!$K6$7
                                                                          • API String ID: 0-185628103
                                                                          • Opcode ID: 8f2c988f121736820da3ab54fe1beac426a523c997176c65e9a7062e1149f3c0
                                                                          • Instruction ID: 63533b16b7cd0be86b3d003f9a97b1cc6ac228165ab9d3a73683563be14346e5
                                                                          • Opcode Fuzzy Hash: 8f2c988f121736820da3ab54fe1beac426a523c997176c65e9a7062e1149f3c0
                                                                          • Instruction Fuzzy Hash: 0761E5757003014BC316AB6DE88465E7BE7EBD4720394826ED419CB398EF78BD068BC1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 321 5b72c90-5b72cf8 325 5b72d61-5b72d67 321->325 326 5b72cfa 321->326 405 5b72d6a call 5b72c81 325->405 406 5b72d6a call 5b72c90 325->406 327 5b72cfd-5b72d03 326->327 329 5b72d89-5b72de8 327->329 330 5b72d09-5b72d13 327->330 328 5b72d70-5b72d7a call 5b72820 333 5b72d7f-5b72d86 328->333 343 5b72e1a-5b72e1f call 5b5ff60 329->343 344 5b72dea-5b72df9 329->344 330->329 332 5b72d15-5b72d1c call 5b70848 330->332 336 5b72d21-5b72d5f 332->336 336->325 336->327 346 5b72e25-5b72e47 343->346 347 5b72ed6-5b72ee0 344->347 348 5b72dff-5b72e0a 344->348 352 5b72e4d 346->352 353 5b72ec9-5b72ed3 346->353 354 5b72ee3-5b72eff 347->354 355 5b72ee2 347->355 348->347 349 5b72e10-5b72e18 348->349 349->343 349->344 356 5b72e50-5b72e66 352->356 357 5b72f05-5b72f07 354->357 358 5b72fb0-5b72fd5 354->358 355->354 362 5b72e6f 356->362 363 5b72e68-5b72e6d 356->363 359 5b72f0d-5b72f11 357->359 360 5b72fdc-5b72fe0 357->360 358->360 359->360 364 5b72f17-5b72f1f 359->364 366 5b72fe2-5b72fe8 360->366 367 5b72fea 360->367 369 5b72e74-5b72e7a 362->369 363->369 370 5b72f25-5b72f27 364->370 371 5b73023-5b7307b 364->371 368 5b72ff0-5b7301c 366->368 367->368 368->371 372 5b72eb2-5b72ec7 369->372 373 5b72e7c 369->373 374 5b72f37-5b72f3b 370->374 375 5b72f29-5b72f31 370->375 403 5b73083 371->403 404 5b7307d 371->404 372->353 372->356 378 5b72e7f-5b72e85 373->378 379 5b72f3d-5b72f41 374->379 380 5b72fa9-5b72fad 374->380 375->371 375->374 378->347 382 5b72e87-5b72eb0 378->382 383 5b72f43-5b72f57 379->383 384 5b72f59-5b72f6d 379->384 382->372 382->378 383->384 393 5b72f76-5b72f78 383->393 384->393 394 5b72f6f-5b72f73 384->394 395 5b72f91-5b72fa1 393->395 396 5b72f7a-5b72f8e 393->396 407 5b72fa3 call 5b73189 395->407 408 5b72fa3 call 5b73198 395->408 404->403 405->328 406->328 407->380 408->380
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (q$Hq
                                                                          • API String ID: 0-1154169777
                                                                          • Opcode ID: 71198542023ace150c51ee45a5c0d46931d11ed65425e03dc6d7b172fd1d26b4
                                                                          • Instruction ID: da37e2e23dd8ca4bad9f8fc9ab44a274c547aace39333387b5cea43dd93d5074
                                                                          • Opcode Fuzzy Hash: 71198542023ace150c51ee45a5c0d46931d11ed65425e03dc6d7b172fd1d26b4
                                                                          • Instruction Fuzzy Hash: D3D16F75E002099FDB14DFA9C984AAEFBB6FF84310F158069E815AB354DB34AD41CBA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 410 17cd531-17cd538 411 17cd588-17cd58c 410->411 412 17cd53a-17cd558 410->412 415 17cd58e-17cd596 411->415 416 17cd5b1-17cd5c5 411->416 413 17cd55e-17cd560 412->413 414 17cd635-17cd65a 412->414 419 17cd566-17cd56a 413->419 420 17cd661-17cd665 413->420 414->420 417 17cd598-17cd59a 415->417 418 17cd5a4 415->418 428 17cd5c7-17cd5ce 416->428 429 17cd5d1-17cd5e2 416->429 417->418 456 17cd5a6 call 17cd6f0 418->456 457 17cd5a6 call 17cd6e0 418->457 458 17cd5a6 call 17cd531 418->458 419->420 425 17cd570-17cd578 419->425 421 17cd66f 420->421 422 17cd667-17cd66d 420->422 426 17cd675-17cd6a1 421->426 422->426 430 17cd57e-17cd582 425->430 431 17cd6a8-17cd6f4 425->431 426->431 427 17cd5ac-17cd5af 427->416 427->429 432 17cd5e4-17cd5f0 429->432 433 17cd5f2 429->433 430->411 435 17cd62b-17cd632 430->435 453 17cd6fc-17cd701 431->453 437 17cd5f4-17cd603 432->437 433->437 444 17cd605-17cd611 437->444 445 17cd613 437->445 448 17cd616-17cd628 444->448 445->448 454 17cd629 call 17cdad8 448->454 455 17cd629 call 17cdac8 448->455 454->435 455->435 456->427 457->427 458->427
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (q$Hq
                                                                          • API String ID: 0-1154169777
                                                                          • Opcode ID: 0acfed5143f7f2e2cc72bce8d0483eac01789d85a29f437f2b292f27a8e74eda
                                                                          • Instruction ID: b3f3cd02560373c1934be7c6298717377f24d714e5b040223e34cc657a5f5aea
                                                                          • Opcode Fuzzy Hash: 0acfed5143f7f2e2cc72bce8d0483eac01789d85a29f437f2b292f27a8e74eda
                                                                          • Instruction Fuzzy Hash: 5431E130B002458FDB289FB8D45476EBBA2ABC0754B1844AEE809DB354CE38DC45C7E1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 459 5b74c90-5b74c9b 460 5b74c9d-5b74ca0 459->460 461 5b74cc8-5b74cf3 459->461 462 5b74ca2-5b74caa 460->462 463 5b74cfa-5b74d25 460->463 461->463 464 5b74cb0-5b74cc7 462->464 465 5b74d2c-5b74dc2 call 5b751d8 call 5b76470 call 5b72820 462->465 463->465 489 5b74dc7-5b74dcb 465->489
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq$Teq
                                                                          • API String ID: 0-2938103587
                                                                          • Opcode ID: c7e25692190f63c491b32640eecb6ae04e12a790b2c9c548ed99c6d8d57af132
                                                                          • Instruction ID: 790ba0ba157e6676ea6e2bf89862ede1e6e903b03ecbea32d12c66cdefaf2ce1
                                                                          • Opcode Fuzzy Hash: c7e25692190f63c491b32640eecb6ae04e12a790b2c9c548ed99c6d8d57af132
                                                                          • Instruction Fuzzy Hash: 8F3168317003540FDB19AB799454A1EBBA2AFC166035841AED50ACF3A5CE35AD03C7A5

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 949 5b751d8-5b7521f 952 5b75225-5b75267 949->952 953 5b754f8-5b7551c 949->953 962 5b7529d-5b752be 952->962 963 5b75269-5b7526c 952->963 960 5b75523-5b75586 953->960 969 5b752c4-5b752cd 962->969 970 5b75371-5b7537b 962->970 965 5b7526f-5b75278 963->965 965->960 966 5b7527e-5b7529b 965->966 966->962 966->965 969->960 973 5b752d3-5b752f9 969->973 974 5b75381-5b7538a 970->974 975 5b754f0-5b754f7 970->975 986 5b75308-5b75315 973->986 974->960 976 5b75390-5b753b9 974->976 976->960 983 5b753bf-5b753e3 976->983 983->960 990 5b753e9-5b753f5 983->990 991 5b75317-5b75320 986->991 992 5b752fb-5b75302 986->992 993 5b754e0-5b754ea 990->993 994 5b753fb-5b75405 990->994 991->960 995 5b75326-5b75343 991->995 992->986 993->974 993->975 994->960 996 5b7540b-5b75427 994->996 995->960 999 5b75349-5b7536b 995->999 996->960 1000 5b7542d-5b75439 996->1000 999->969 999->970 1000->960 1001 5b7543f-5b75450 1000->1001 1001->960 1003 5b75456-5b75461 1001->1003 1005 5b7546b-5b7547b 1003->1005 1005->960 1007 5b75481-5b7548d 1005->1007 1007->960 1008 5b75493-5b754a8 1007->1008 1008->960 1009 5b754aa-5b754cb 1008->1009 1009->960 1011 5b754cd-5b754da 1009->1011 1011->993 1011->994
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: 3fe5d4e90a950dcdb9d107a49978e3ad74ff00107b59264b30134eb7b4c3711c
                                                                          • Instruction ID: 64b8f9256a164931a3017d5f9b6d3d9035d277a3063e54252e6c2fdeb1d36edf
                                                                          • Opcode Fuzzy Hash: 3fe5d4e90a950dcdb9d107a49978e3ad74ff00107b59264b30134eb7b4c3711c
                                                                          • Instruction Fuzzy Hash: CDC14C74600619CFCB14DF58C484DBABBF2FF84304B968499E4569B2A6DB30FD46CB90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1118 17c8a98-17c8ab8 1119 17c8aba-17c8adb 1118->1119 1120 17c8ae2-17c8af1 1118->1120 1119->1120 1121 17c8afd-17c8b0a 1120->1121 1122 17c8af3 1120->1122 1125 17c8bde-17c8bf2 1121->1125 1126 17c8b10-17c8b1f 1121->1126 1122->1121 1128 17c8bfe-17c8c21 1125->1128 1129 17c8bf4 1125->1129 1130 17c8b2b-17c8b37 1126->1130 1131 17c8b21 1126->1131 1142 17c8c2d-17c8c37 1128->1142 1143 17c8c23 1128->1143 1129->1128 1135 17c8b39-17c8b48 1130->1135 1136 17c8b70-17c8b7f 1130->1136 1131->1130 1140 17c8b4a 1135->1140 1141 17c8b54-17c8b6f 1135->1141 1137 17c8b8b-17c8bb2 1136->1137 1138 17c8b81 1136->1138 1149 17c8bbe-17c8bdd 1137->1149 1150 17c8bb4 1137->1150 1138->1137 1140->1141 1176 17c8c3a call 17c8da8 1142->1176 1177 17c8c3a call 17c8da1 1142->1177 1143->1142 1150->1149 1151 17c8c40-17c8c42 1152 17c8c88-17c8c9b 1151->1152 1153 17c8c44-17c8c53 1151->1153 1156 17c8c9d-17c8ca1 1152->1156 1154 17c8c5f-17c8c86 1153->1154 1155 17c8c55 1153->1155 1154->1152 1154->1153 1155->1154 1158 17c8cac-17c8ccd 1156->1158 1159 17c8ca3 1156->1159 1165 17c8ccf-17c8cfe 1158->1165 1166 17c8c80-17c8c9b call 17c8d92 1158->1166 1159->1158 1170 17c8d0f 1165->1170 1171 17c8d00-17c8d0d 1165->1171 1166->1156 1172 17c8d12-17c8d2e 1170->1172 1171->1172 1176->1151 1177->1151
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (q
                                                                          • API String ID: 0-2414175341
                                                                          • Opcode ID: ea6776700442ff012e763ca9323bedb392399d39fc4c9090e4a751a5c3323d87
                                                                          • Instruction ID: 7ae870fd20bcde6ea7cc8ec7708e4da28430bc0848e68175dc7d090be30cb4b4
                                                                          • Opcode Fuzzy Hash: ea6776700442ff012e763ca9323bedb392399d39fc4c9090e4a751a5c3323d87
                                                                          • Instruction Fuzzy Hash: 71611534B106198FDB14DF69E894AAEB7B2FF8D711B104198E906DB365DB30EC02CB41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'q
                                                                          • API String ID: 0-1807707664
                                                                          • Opcode ID: 7f849fc40f8db2393d16a2d65d02563a5194bf78973fb46450978b91b3952794
                                                                          • Instruction ID: dd33d8689237b34b834cf7e8050913f0be1be21df076e1098295f0918e6e2a76
                                                                          • Opcode Fuzzy Hash: 7f849fc40f8db2393d16a2d65d02563a5194bf78973fb46450978b91b3952794
                                                                          • Instruction Fuzzy Hash: 7C418274B006058FD718DF65C454BAEBBF2FF88720F5485A9E516AB3A0DB30AD02CB91
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (q
                                                                          • API String ID: 0-2414175341
                                                                          • Opcode ID: 80376d3140e5721119d5423c0504304d5ea5b70446d52bec079144ae56092c98
                                                                          • Instruction ID: 04ccde07d198e82b1d6fddb13f20646ead04fde85dde2d3ea7681d99090517af
                                                                          • Opcode Fuzzy Hash: 80376d3140e5721119d5423c0504304d5ea5b70446d52bec079144ae56092c98
                                                                          • Instruction Fuzzy Hash: A7318B75B002148FDB15DF69E494A5EB7B2EF8961171041ADE906DB315DB30EC028B91
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRq
                                                                          • API String ID: 0-3187445251
                                                                          • Opcode ID: 01d3af9bb8d60d9f125e41abdf6f785f5e83f0dc3f04621fa882f0593c7293db
                                                                          • Instruction ID: f4a55c4b4aab16d2c62fc09e92427be4c52d314e465f9f279f3d93a5efc94f18
                                                                          • Opcode Fuzzy Hash: 01d3af9bb8d60d9f125e41abdf6f785f5e83f0dc3f04621fa882f0593c7293db
                                                                          • Instruction Fuzzy Hash: EB218130B012189BDF14DFA5E4597AE7BB7FB88701F204069E412A7394DF746D01CB90
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRq
                                                                          • API String ID: 0-3187445251
                                                                          • Opcode ID: b0b7fabc8e103ec33335b7ded0ed6d141a8ead05ab3ee46999dc90de7119629b
                                                                          • Instruction ID: 79955073d771bac48ad3c3ee89fb3efc9f197072d3005611038bb54ebddf00ce
                                                                          • Opcode Fuzzy Hash: b0b7fabc8e103ec33335b7ded0ed6d141a8ead05ab3ee46999dc90de7119629b
                                                                          • Instruction Fuzzy Hash: 81218F30B012189BDF24DFA4E5697AE7BF6FB98702F204069E422B7394DB746D05CB50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (q
                                                                          • API String ID: 0-2414175341
                                                                          • Opcode ID: 7980aa597e4d0526290cb48aae05e45310611b3e7d47ab905f07128c78dfb8ab
                                                                          • Instruction ID: 5bd80c91707082a2d017adf582aff489bad2e3a48318f1f3f2360bfec8444bb5
                                                                          • Opcode Fuzzy Hash: 7980aa597e4d0526290cb48aae05e45310611b3e7d47ab905f07128c78dfb8ab
                                                                          • Instruction Fuzzy Hash: 9311E67A7042008FC725DB69D494B2ABBF3FFCD26071541ADE44ADB341DA32EC028B90
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: 91ed26938846c430dce5e455f3175fd5e27ac848ce1731b2f8267a3e38e951d0
                                                                          • Instruction ID: bebb4268af1e6a2fad5eea87e8ed510915c312dbee54da10b276c97f08f59698
                                                                          • Opcode Fuzzy Hash: 91ed26938846c430dce5e455f3175fd5e27ac848ce1731b2f8267a3e38e951d0
                                                                          • Instruction Fuzzy Hash: 9D217F356042589FCB18DF68C459A997BF2FF89310F1500ADE416EB361DF71AD41CBA1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (q
                                                                          • API String ID: 0-2414175341
                                                                          • Opcode ID: 5f75708d3da5dc9101dd70a1b5ed25753331d54da549000ec5ce13d9d1965e37
                                                                          • Instruction ID: d20a8dad01c96842ee1ddcd439c23e10453bdf5928aca994516fd80172ac6b7b
                                                                          • Opcode Fuzzy Hash: 5f75708d3da5dc9101dd70a1b5ed25753331d54da549000ec5ce13d9d1965e37
                                                                          • Instruction Fuzzy Hash: D5118F797042048FD725DB6DE894A2ABBE6FBCC660715856DE44ACB300DE32EC028B90
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: c8e9bbd7e49681755bbfd5d4c81f4a4f85e1f9fd63244796fc38716c35e1e91d
                                                                          • Instruction ID: 9c001293ebdac8f395cf050748386b5cfbf4df299f7d813cc908e74f99c75d8f
                                                                          • Opcode Fuzzy Hash: c8e9bbd7e49681755bbfd5d4c81f4a4f85e1f9fd63244796fc38716c35e1e91d
                                                                          • Instruction Fuzzy Hash: 5701F97270D3D01FC31287389C24A467FF59F4A511B1B00EBE545CB3E3C914AC0587A2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: 3abeb7672f004ffb83211cb7c2236e94bcfe02f44a215c9afaf50167541bd5a2
                                                                          • Instruction ID: 27eba208eb661b8dd792c66e5d97f30c744f42423866fa46dd3359e52fc9f36b
                                                                          • Opcode Fuzzy Hash: 3abeb7672f004ffb83211cb7c2236e94bcfe02f44a215c9afaf50167541bd5a2
                                                                          • Instruction Fuzzy Hash: 59113C74B002149FCB18DF28C459A99BBF2BF89310F1004ADE412EB3A0CF75AD41CB90
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: 7a7eca43d54c1556e7c7d6f0764e79ffd7d744df29a799f417c977050ca3771c
                                                                          • Instruction ID: c9bc31ff1235fdf759d2fce05be60125ac921d5995e5176a4eb88789f9c25cf5
                                                                          • Opcode Fuzzy Hash: 7a7eca43d54c1556e7c7d6f0764e79ffd7d744df29a799f417c977050ca3771c
                                                                          • Instruction Fuzzy Hash: 17F0F6727042106FD3109A99A8D0A6FBFABEBD9660714446BE809CB366CE719C0683A0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: 87351029506ca1c3426ad92d1aaf0fc14865d9213cb32c3e4889c83f3cb08d51
                                                                          • Instruction ID: 1a71f4170a59df43a2903a20aea8977721afcbed1a537ddcf674272e52412112
                                                                          • Opcode Fuzzy Hash: 87351029506ca1c3426ad92d1aaf0fc14865d9213cb32c3e4889c83f3cb08d51
                                                                          • Instruction Fuzzy Hash: 1BF022323011500FC718AA2EA889B9EFBDAEFCD22074440BEF40EDB351CE208C068391
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teq
                                                                          • API String ID: 0-1098410595
                                                                          • Opcode ID: 8d8901e5ef3449e4da0034727d1bb32d9af168ab2eb16152233dd9f556623929
                                                                          • Instruction ID: 8c59bc2c4fa9a179c424e9b3b78693112a2fd482b076c274db5637b4e9e210a4
                                                                          • Opcode Fuzzy Hash: 8d8901e5ef3449e4da0034727d1bb32d9af168ab2eb16152233dd9f556623929
                                                                          • Instruction Fuzzy Hash: 60E065753501105FC7549B6EE898F5AB7DAEFCDA20B2540A9F509CB3A1CE61DC058790
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: PHq
                                                                          • API String ID: 0-3820536768
                                                                          • Opcode ID: 93f985dc85fb46d7e426e8f2dc4d2d1c1861047633d241964ea96cb83a899eb4
                                                                          • Instruction ID: e72f91f65fa7eb05c0530cdda370c4b3c71a0cae439ca638efdeb0d63e035a07
                                                                          • Opcode Fuzzy Hash: 93f985dc85fb46d7e426e8f2dc4d2d1c1861047633d241964ea96cb83a899eb4
                                                                          • Instruction Fuzzy Hash: EDD02B7250030447DF304E24B8063163B557B42310F68015CB4618A3C1E532E00387D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2118228a547edc62dc66cf53785696cbe197f1bb9180e79587229d1aabfd04ea
                                                                          • Instruction ID: ca5b1f72b64eb69c5a1f6bd63295b45e13fa27edc28eee43cd90708971a52ded
                                                                          • Opcode Fuzzy Hash: 2118228a547edc62dc66cf53785696cbe197f1bb9180e79587229d1aabfd04ea
                                                                          • Instruction Fuzzy Hash: E30168366042499FCB11CF64CC44AAABFB5FF85200B1580BAD54497351EA31AD05CBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 89345cd288e03088460848ff7d01b613d738c2b879405ad0542e2ec8640cc53b
                                                                          • Instruction ID: bdac7aec297afb28141dcbda3658b72433021e1cd72fd4559f88f19c41276a33
                                                                          • Opcode Fuzzy Hash: 89345cd288e03088460848ff7d01b613d738c2b879405ad0542e2ec8640cc53b
                                                                          • Instruction Fuzzy Hash: F5E16F74A00615CFCB15DF58C884AAABBF2FF88310B5685A9E8499B365DB30FD45CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: af66e34519a37be017042813b7bf64693f854afed9beee6a7002a995996805fc
                                                                          • Instruction ID: 9858143346b3236748377b1bad47955abbbaec25f03478f0d51a8c684f4393b6
                                                                          • Opcode Fuzzy Hash: af66e34519a37be017042813b7bf64693f854afed9beee6a7002a995996805fc
                                                                          • Instruction Fuzzy Hash: C7B1C030B047058FC714DF68C850A6EBBB2FF85320F1485AAE5699B395DB70ED45CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: eb354c717ffa7fa25721c671063de9b670029d649db82bff5814c65a2b002e67
                                                                          • Instruction ID: 3ab8786b0c63efe891f8ed9c3e9376ef034ad1851d2f9c02b6bd0c687e254266
                                                                          • Opcode Fuzzy Hash: eb354c717ffa7fa25721c671063de9b670029d649db82bff5814c65a2b002e67
                                                                          • Instruction Fuzzy Hash: 4FC1F635A0160A9FCF11CFA8C9848AEFBB2FF49710B24846DE915AB361D731ED55CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 99171edfe9690b76afe1231c5201121b690b788576c094798a15f4a7264a6bb2
                                                                          • Instruction ID: ec24b1c155add6bef5c7788dad003594cc711dc3f434da24c1eaa0d612e5de15
                                                                          • Opcode Fuzzy Hash: 99171edfe9690b76afe1231c5201121b690b788576c094798a15f4a7264a6bb2
                                                                          • Instruction Fuzzy Hash: 72C1C474A002089FDB54DF68C894E6AB7F2FF88314F558199E919AB3A1DB35EC41CF60
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f4cc63d40adfe1437c4e6b7ded3fe2621679bf2a657c93a1bcdc70dc6be36ab9
                                                                          • Instruction ID: 1ac1d849904334f2f635d4ba7428d62c3d508f72170325b588860725e2fde39f
                                                                          • Opcode Fuzzy Hash: f4cc63d40adfe1437c4e6b7ded3fe2621679bf2a657c93a1bcdc70dc6be36ab9
                                                                          • Instruction Fuzzy Hash: 17A15D74B002059FDB15DF69D898A6DBBF2FB98700B54846DE806DB365DF74EC068B80
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 55cc913b1e01341efb65f28521b7da3e7ae767b6ffefb230535e85ac7000f433
                                                                          • Instruction ID: 13e2539100c67e49cde61d5cf068723281104e05fcdfeae2a13e8cd71b39d311
                                                                          • Opcode Fuzzy Hash: 55cc913b1e01341efb65f28521b7da3e7ae767b6ffefb230535e85ac7000f433
                                                                          • Instruction Fuzzy Hash: 48915B74B002059FDB15DF69D898A6EBBF2FB98700B54842DE806DB365DF74EC068B80
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d5ab6a5ef429567e27b9a2f8cd984c58b2a4db930aa41c8da0513959c0856699
                                                                          • Instruction ID: f86c82cddcf7c86933cb273a903459d7b73644ba0efbf9f9e4f395c7221ee61d
                                                                          • Opcode Fuzzy Hash: d5ab6a5ef429567e27b9a2f8cd984c58b2a4db930aa41c8da0513959c0856699
                                                                          • Instruction Fuzzy Hash: E4914B30B003158BCB55DF69E88495EBBF2FF85710B54826DE8099F359DB71AD06CB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0bd3175b539ce2d6dc51d55c28aa67dc4bb6fd2d5568bb2282e8125a386bbff7
                                                                          • Instruction ID: ad87f320fe216b9e552f78362da054812381b470a1e4679b652cf815cefffbce
                                                                          • Opcode Fuzzy Hash: 0bd3175b539ce2d6dc51d55c28aa67dc4bb6fd2d5568bb2282e8125a386bbff7
                                                                          • Instruction Fuzzy Hash: 8E816C70B006099FDB04DF68C885AAEBBB6FF85314F158199E915AB391DB70ED41CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8dcaf2869c5d76af53b73f63dae35366b014eb3acf36257a5d9045c856f06615
                                                                          • Instruction ID: 9212321ef2a571f02dc5e27fc2e222ee5c9dc93bd74701975e00a64bb81399ce
                                                                          • Opcode Fuzzy Hash: 8dcaf2869c5d76af53b73f63dae35366b014eb3acf36257a5d9045c856f06615
                                                                          • Instruction Fuzzy Hash: CA815C71A007049FCB24CF68C580A6ABBF6FF84310B4589A9E8969F655D770FD41CFA0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 190a838cbffb717f924d09923d9300b165e72c9faed564ddd4b2c146a0c303bf
                                                                          • Instruction ID: cc2b589d57b8436d3a4cc5bc5bdcfeda9839f22f4af4fb45877e08511cc5c5be
                                                                          • Opcode Fuzzy Hash: 190a838cbffb717f924d09923d9300b165e72c9faed564ddd4b2c146a0c303bf
                                                                          • Instruction Fuzzy Hash: E761A831B001199FCB18DF68D894AAEBBF2FF88310F518069E915AB351CB31AD51CF91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7f9268b13e086ffc932966e74dd52cd406635a98789ed0771ec19f23e7c0e0ad
                                                                          • Instruction ID: f3e26a466f7bb82fbebdfb88776b806dcdbcbe4d60d25de35dcc7fcd79840712
                                                                          • Opcode Fuzzy Hash: 7f9268b13e086ffc932966e74dd52cd406635a98789ed0771ec19f23e7c0e0ad
                                                                          • Instruction Fuzzy Hash: 9F61AF31B002058FCB44DF69C8954AEBBF2FF8961075885AEE50AEB355DF71AC06CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d765fd2123e7e6f01e47f27bd2f10ad42d4dd13666e08687d3f65c5d57707c65
                                                                          • Instruction ID: 6faa12306bb9b24c211e8c5412d0f1338d61d3a0269c3e153c6c0eef9b3dff98
                                                                          • Opcode Fuzzy Hash: d765fd2123e7e6f01e47f27bd2f10ad42d4dd13666e08687d3f65c5d57707c65
                                                                          • Instruction Fuzzy Hash: 8A511B75E106158FCB44CFA9C88499DBBF6FF8A700B25856AE505EF321DBB1AD06CB40
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f917657350a3e7531a0d45f59cada80518b555da38b88b1f1b045980ddcd33ee
                                                                          • Instruction ID: 8c2ff15c0b9322dde675b0988a7e47ff9040d027c02e5e070b5559865c8b80eb
                                                                          • Opcode Fuzzy Hash: f917657350a3e7531a0d45f59cada80518b555da38b88b1f1b045980ddcd33ee
                                                                          • Instruction Fuzzy Hash: 05518F30E003099FDB11DFB9E848BDDBBB2FF99300F508569E405AB254DB75A985CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 477ff9a48c3bc0dbf410216dc57c9bc5fb0d624dddd670d4d5c527be02e5197d
                                                                          • Instruction ID: a785ff9c4da77949a4d256ac2dc6dbeff4caba75dc6562c0eaf4949f9b604498
                                                                          • Opcode Fuzzy Hash: 477ff9a48c3bc0dbf410216dc57c9bc5fb0d624dddd670d4d5c527be02e5197d
                                                                          • Instruction Fuzzy Hash: 075169747002099FCB08DF68C885E6EBBB6EF85314F558099E9159F3A1DB31ED42CBA0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2d41a0c5dd528c8ce21d708f08001bf474b460d564f245da89bdb63c38988466
                                                                          • Instruction ID: 5fb734df32ea33193007280b4b83ac2ee92f56827aa6dcf2e925762287729db1
                                                                          • Opcode Fuzzy Hash: 2d41a0c5dd528c8ce21d708f08001bf474b460d564f245da89bdb63c38988466
                                                                          • Instruction Fuzzy Hash: 5F511D347102118FDB28DF29D8D8A56BBB2EF89721B44419CE915DF3A9D730E816CF91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bb7d94abe87b52343ca2151bbdc699b61658f1a12c2f3f53674554a211c4e890
                                                                          • Instruction ID: 0921cb7b3401b789d07beba872a2dc48faa66370d2b5237805bc49624981c144
                                                                          • Opcode Fuzzy Hash: bb7d94abe87b52343ca2151bbdc699b61658f1a12c2f3f53674554a211c4e890
                                                                          • Instruction Fuzzy Hash: 92516D30E003099FDB10DFA9E844B9DBBB2FF99300F508659E415BB264DB75A985CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 88160ec67cbbbefa0d9018b57f9ecb98efec3709a46bfaa7d62bb39430b79a38
                                                                          • Instruction ID: aa021cf4efdda2e4824db848785067d10b46cdff263fb99c7824830a85c58085
                                                                          • Opcode Fuzzy Hash: 88160ec67cbbbefa0d9018b57f9ecb98efec3709a46bfaa7d62bb39430b79a38
                                                                          • Instruction Fuzzy Hash: 2F41E974B002059F9B24DF98D884AAAB7F6EBCC710B5480ADE905DB355DB71ED028BA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f49b24273da3860799e27175ac340aaa1e01b229441062a40edb35ad2f618f39
                                                                          • Instruction ID: 9092f9ad9705a6e848f5e638141a9571d204d5080d6cba41ddf739347f51d1ab
                                                                          • Opcode Fuzzy Hash: f49b24273da3860799e27175ac340aaa1e01b229441062a40edb35ad2f618f39
                                                                          • Instruction Fuzzy Hash: 544130306006118FDF28DF29E8D965ABBB1EF49715B0481ACE8119F2D9DB30E956CF91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c1295b17f33081bec61bbc09e19c3a754dd3de36f18aa477ebdc5987bd9a13d6
                                                                          • Instruction ID: 88110196c892b4a26d6b565c78c1c58f8912e79e593703a06b752fc42c0c8ab1
                                                                          • Opcode Fuzzy Hash: c1295b17f33081bec61bbc09e19c3a754dd3de36f18aa477ebdc5987bd9a13d6
                                                                          • Instruction Fuzzy Hash: EA317031B002058FDB24AF69C4A8BAEFBF6AF89714F10546DE506EB794DB70DC418B90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c42f934631a9527d21b44613ad9bf9fed917c0087b811e9e89554bb0f5c7be11
                                                                          • Instruction ID: 9286c54554f106294ac4cabca2ebbb9cb45e86e908affd7b4dc020161e896b11
                                                                          • Opcode Fuzzy Hash: c42f934631a9527d21b44613ad9bf9fed917c0087b811e9e89554bb0f5c7be11
                                                                          • Instruction Fuzzy Hash: 49414C3560060A9FCB15CF58C8808AABBB2FF4A354B25C49DF9599B361D732E916CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 33f3df208135206880c45f747a3bd7216f2050f82c671c7923f6287c36454314
                                                                          • Instruction ID: 45b8abfd456ad8186326dfca298beec60588836024210c95974c826f3339b821
                                                                          • Opcode Fuzzy Hash: 33f3df208135206880c45f747a3bd7216f2050f82c671c7923f6287c36454314
                                                                          • Instruction Fuzzy Hash: D231AE357093448FC715DB68D844A1ABFF6EF8A61471A84EAE499CF362CA35EC01C790
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f78c819691aeb36681ca66f51dc70106640e8a63560f22e10e2272c7568a3650
                                                                          • Instruction ID: d54c73f0690476a19af09a259e7d57ee1ed8f9488058802c326cf112cfc66731
                                                                          • Opcode Fuzzy Hash: f78c819691aeb36681ca66f51dc70106640e8a63560f22e10e2272c7568a3650
                                                                          • Instruction Fuzzy Hash: FF416D74E012199FDB18DFAAD944AAEFBF2BF88300F14812AE814A7354DB349941CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8dbf3910eaa472c48c3229aa174e1a3274faba723872564a6fc4cf51ecf53490
                                                                          • Instruction ID: bd24a1536b943359d3089b20f2354d2796d7936627cbfef326fa10fb7e4d8ed4
                                                                          • Opcode Fuzzy Hash: 8dbf3910eaa472c48c3229aa174e1a3274faba723872564a6fc4cf51ecf53490
                                                                          • Instruction Fuzzy Hash: 3A3127323043010BC712BB7DA8A45AE7FA6DFD5B2078441AED4498F365EE34BD0A87D6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 64a29135944843b8973d76fa4e3aff98615cf4e305f0dce05625868c01036071
                                                                          • Instruction ID: 2b352b921aad2a20583836fc1e612c88c1182ac980ecefab40393ecf65dd99c3
                                                                          • Opcode Fuzzy Hash: 64a29135944843b8973d76fa4e3aff98615cf4e305f0dce05625868c01036071
                                                                          • Instruction Fuzzy Hash: 7141F276E002099FCB15DFA9C9849EEFBF6FF88310B15806AE515F7250DB30A941CBA4
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8eee7495dcebccbecfb60380350fe75ea0af485315717353c7622daeb4e03588
                                                                          • Instruction ID: 375684bd84dbed5cea96b8ad1b5b122c66cff71b1f01bd72aef7677fe92aed48
                                                                          • Opcode Fuzzy Hash: 8eee7495dcebccbecfb60380350fe75ea0af485315717353c7622daeb4e03588
                                                                          • Instruction Fuzzy Hash: 57316D31B002048FDB18DF69C498AAEF7F6EF89760B1484ADE816EB351DB31ED058B50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 805351f3024e8bc6aa48eea94f8dfb9300bd858fc9d3db2279f78958d878cadc
                                                                          • Instruction ID: 708f964fe65148dae8d5027c5a2414be14837c306d14e87fd433f2d5ccc1b033
                                                                          • Opcode Fuzzy Hash: 805351f3024e8bc6aa48eea94f8dfb9300bd858fc9d3db2279f78958d878cadc
                                                                          • Instruction Fuzzy Hash: F3311A30A007018FD770DF2AD84866AB7F2BF89724B144A6CD596DB7A5D730E946CF90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d5f5d31988938b6a9b91aadc9948695ae4b7cbf4f70862b547e633bcb4fcaf1d
                                                                          • Instruction ID: 63fd5ae6fbb51a2eb695ef4dd5e8c5e0dfbb3bbb8caaf76e5f9a83881f98bc7d
                                                                          • Opcode Fuzzy Hash: d5f5d31988938b6a9b91aadc9948695ae4b7cbf4f70862b547e633bcb4fcaf1d
                                                                          • Instruction Fuzzy Hash: 0C314C706007028FC770DF2AC84466AB7F1EF89724B108A6CD5A6DB7A1D731E946CF90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a724b83250df18b69c85fa7ce8cbda84127471c92ba4654d0b248fdd6a1387ae
                                                                          • Instruction ID: b95d12c0d97de857753a3ea48fd8bfdc4dc7bb9be340d42712c500c1ff59705b
                                                                          • Opcode Fuzzy Hash: a724b83250df18b69c85fa7ce8cbda84127471c92ba4654d0b248fdd6a1387ae
                                                                          • Instruction Fuzzy Hash: 2C31AC75704109AFDB64CF68D884BAE3BFAEB88300F104264E816EB695D731FC41DBA0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d914f07a13c2348dc16468a268174567addeb204d2f9446440b6043830a1666b
                                                                          • Instruction ID: 745a4b5c196a171562fb468fc2b44a4fc1a9231a22ef689917ca628d4abcb860
                                                                          • Opcode Fuzzy Hash: d914f07a13c2348dc16468a268174567addeb204d2f9446440b6043830a1666b
                                                                          • Instruction Fuzzy Hash: 21218E35B00205CBDF21DFA9D4989AEF7B2EF95314B24847EE909DB215DB30D915CBA0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b4c6f53631eb5e6431ed194504c771f1109bb51ae4ce1cff250251906077146f
                                                                          • Instruction ID: 8732e4ae68cf0403e39612515f87d92af6a16eb7f3ee406bb9291a891c56f359
                                                                          • Opcode Fuzzy Hash: b4c6f53631eb5e6431ed194504c771f1109bb51ae4ce1cff250251906077146f
                                                                          • Instruction Fuzzy Hash: F221F5323002024BC716BB7DE89452E7AD7EBE9B60380816DD4198B368EF34BD0687E1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 30a7cd75aa40ba6ab8c96a0f201c1e9fd9f442f0bf0b59489b8bd64772c9e3a5
                                                                          • Instruction ID: 2566c3f34f1f245005037df72b7c7968044a11ee823b9878579b189054849783
                                                                          • Opcode Fuzzy Hash: 30a7cd75aa40ba6ab8c96a0f201c1e9fd9f442f0bf0b59489b8bd64772c9e3a5
                                                                          • Instruction Fuzzy Hash: C121C231B043458FCB51EF28D4A449ABFF2EFD5620754819EE406DB3AADE70BC098B95
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b8a1cb7ed016beb7d67ae32412ab8ea367636d07c7b4f6d8422087aa011c2eed
                                                                          • Instruction ID: 015527ab35fb59f0a3a9d788f946f3bc3db42acfbfa6f94728f013688d61083c
                                                                          • Opcode Fuzzy Hash: b8a1cb7ed016beb7d67ae32412ab8ea367636d07c7b4f6d8422087aa011c2eed
                                                                          • Instruction Fuzzy Hash: 47219C30A04B018FD774DF69D84466AFBF5BF89B24B000A2CD666CB2D4DB30E905CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 80dd8a9cd814ae6044f685b13f7b3caa28b486ac3d216b38e2d2c5b6dee5be55
                                                                          • Instruction ID: ff6f0743aef3044f733333879b4487801db078f8d942f9022a7981ff3b412ed5
                                                                          • Opcode Fuzzy Hash: 80dd8a9cd814ae6044f685b13f7b3caa28b486ac3d216b38e2d2c5b6dee5be55
                                                                          • Instruction Fuzzy Hash: 5521D0757042406BC728AB65E855B6DFBB2FFC9321F204169E56ACB3C0DB707805CB50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 24a258efde71f091a068a5aae13721e5e731b440c294690aa4d3a29d12c3eedd
                                                                          • Instruction ID: 0cb2150119f062fd96ad971cb12701476bd06f63dc487ed910cf222852c7af18
                                                                          • Opcode Fuzzy Hash: 24a258efde71f091a068a5aae13721e5e731b440c294690aa4d3a29d12c3eedd
                                                                          • Instruction Fuzzy Hash: EC21EF74E002188FDB19CFAAD8446EEBBF2EF89310F14C16AD414B7264DB384942CF90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 44fe11e14721aa2cbc5251e48c617ae1d05a66e96859ee1d972b6bd9c315cc53
                                                                          • Instruction ID: e54c567b84a621e51ac903801b74993aa3b607e189aa9e379accb59bcbf99045
                                                                          • Opcode Fuzzy Hash: 44fe11e14721aa2cbc5251e48c617ae1d05a66e96859ee1d972b6bd9c315cc53
                                                                          • Instruction Fuzzy Hash: C921A631700201CBDF28CF28D8C559ABBB5EF49721B04425CE9159F2D9DB31E955CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e3a3ee15ef690cad769af6c0246b85406f5a20937a480d4dd1905157ff2d30f6
                                                                          • Instruction ID: a14d58e253bf2903b787db0fe0e003e40193e9f3880e81e27a71180591fc9e29
                                                                          • Opcode Fuzzy Hash: e3a3ee15ef690cad769af6c0246b85406f5a20937a480d4dd1905157ff2d30f6
                                                                          • Instruction Fuzzy Hash: 341184357012008BCB50DE79C4D466EFBE2EF95660344C5AEE806CF36AEB30ED068752
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4e6810b49a321b858a21af553dff8f28e82b7323c0edeac42ccb8f885997d276
                                                                          • Instruction ID: 0cb302b5e96fbee8e889fe2b852767900cf77aa31f71d55990ac661ab65c2580
                                                                          • Opcode Fuzzy Hash: 4e6810b49a321b858a21af553dff8f28e82b7323c0edeac42ccb8f885997d276
                                                                          • Instruction Fuzzy Hash: 2C215C35B012048BCB14DF7AD89495EFBF6EF85660344C56EE809CB35AEB30ED058B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f69c019c2e3a2a7f57c60ebafb22ec92e661cf274cfe41a6952b8d65a24d5b26
                                                                          • Instruction ID: e2c46b730ba09bae704b9f5c764ded89631f3896b7af3bb9f5eb696a4d3ca770
                                                                          • Opcode Fuzzy Hash: f69c019c2e3a2a7f57c60ebafb22ec92e661cf274cfe41a6952b8d65a24d5b26
                                                                          • Instruction Fuzzy Hash: D5213B302007018FD735CF25D858A9AFBF1EF45320B044A6CE5639B6E0DB31A94ACF80
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d1926046cfca4726a01cd05e37566b6beafdecb264777030e84ffc9df3dc5bbb
                                                                          • Instruction ID: a13ff5975c8e8ec8c01309b86589dc56e49f507e1f68512cd4757e02a8f2dc80
                                                                          • Opcode Fuzzy Hash: d1926046cfca4726a01cd05e37566b6beafdecb264777030e84ffc9df3dc5bbb
                                                                          • Instruction Fuzzy Hash: A611B29790E3D00FD313873858B52D57F719E6351174A44DBC0E08F2A3E254950FD762
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ae990a6b37cd3cdb16fef4251274b3346c09bf4ecfda7de01694f096b80bb405
                                                                          • Instruction ID: 1dcd0f5c1f0642ea398259655eebab43b0368813afc93269e70043b4fa069350
                                                                          • Opcode Fuzzy Hash: ae990a6b37cd3cdb16fef4251274b3346c09bf4ecfda7de01694f096b80bb405
                                                                          • Instruction Fuzzy Hash: 9601A1763001408F8715DA6DF494869FBE7FBE967031480BBE505DB361CE22AC028760
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 22815851c5b0607fd820dcca792081ea9c3e63cb85c71900e89b294db6305d04
                                                                          • Instruction ID: 14c1f206403083ccc4f2c505bd354210c4852e12720ee5c7a7897351a92c4496
                                                                          • Opcode Fuzzy Hash: 22815851c5b0607fd820dcca792081ea9c3e63cb85c71900e89b294db6305d04
                                                                          • Instruction Fuzzy Hash: AF11AB31A002499FCB15DB6598558BEBFB9FF8521031880EDD4058B361DE31ED06CBA2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8d313b49f7f62e4a7431923148e8c93bc62338b868ec57d8b612a6ea615a0097
                                                                          • Instruction ID: c0fcdf5236bbb8c99ed3d1382de1b38a45515ebe7bdedc71c34e71698a3b04d4
                                                                          • Opcode Fuzzy Hash: 8d313b49f7f62e4a7431923148e8c93bc62338b868ec57d8b612a6ea615a0097
                                                                          • Instruction Fuzzy Hash: 2F01C836F001198FCB14DB95EC496BFFBBAFB85761F040165E925E3380EB3059058BA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b80e90e6b7116f5d27307933787d6c0d431aa0a30c232962303bc7b0d87a1f0b
                                                                          • Instruction ID: be7573d0a1f1fe099db00c8f2d19d296cc6582b8ac4ade303706571bc7a5d5d0
                                                                          • Opcode Fuzzy Hash: b80e90e6b7116f5d27307933787d6c0d431aa0a30c232962303bc7b0d87a1f0b
                                                                          • Instruction Fuzzy Hash: CA1137B4E002099FCB04DFA9D454AAEFBB1FF89300F0485AAD414A7365CB34AA41CFA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 13b64badc09e8d7b6483cf13318e6c20d71f6d7a86bc3a6fa6e8031d84e57e22
                                                                          • Instruction ID: 8418d6f1cf7d21ba16de2efa840a37ead6da7d30189584b666b06fe5ac10bd10
                                                                          • Opcode Fuzzy Hash: 13b64badc09e8d7b6483cf13318e6c20d71f6d7a86bc3a6fa6e8031d84e57e22
                                                                          • Instruction Fuzzy Hash: E51106B8E00209DFCB04DFA9D454AAEFBB1FF89300F50846AD515A7364DB34AA018FA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 915134ea1052affa2c3d07b89723573e30663610611bc90d75ee4e49524d206b
                                                                          • Instruction ID: e8eaae9c34a7a7bbe435028230fd480c26de31523f465c9add6aa43fe92b5640
                                                                          • Opcode Fuzzy Hash: 915134ea1052affa2c3d07b89723573e30663610611bc90d75ee4e49524d206b
                                                                          • Instruction Fuzzy Hash: 7C010C367042149FC758DB79D88892ABBEAEFC966435585B9E809CB364DE31EC018B90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1344888868.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_141d000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8d9ba3a49476f4199a085ff03beb8ae9e424997de19c85f0e0abfdef4df64869
                                                                          • Instruction ID: 119bcc83f691d1183beb08ae910c7ed44e946595d44d1b2ed6ceab9b0c869e61
                                                                          • Opcode Fuzzy Hash: 8d9ba3a49476f4199a085ff03beb8ae9e424997de19c85f0e0abfdef4df64869
                                                                          • Instruction Fuzzy Hash: DC01527144D3C09FD7128B258894B52BFB4EF53224F1981DBD9888F2A7C2795849CB72
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1344888868.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_141d000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7c3a385c22a4dd47500083a09e0fe354584029657abe15910f5ef3588b41157b
                                                                          • Instruction ID: 7130d9c9ecd12cd82262963f2580c15906e9bc3d8d086acb4e5b4ae75d58949f
                                                                          • Opcode Fuzzy Hash: 7c3a385c22a4dd47500083a09e0fe354584029657abe15910f5ef3588b41157b
                                                                          • Instruction Fuzzy Hash: 50012BF1C083009EE7204A59CCC8B67FF98DF452A9F08C56BED480F297C2799846CAB1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a60bffa59aa4d84220f829e3780c962f4c1ddd143b69d8d3f710ee6b42b2140d
                                                                          • Instruction ID: 4d4ce4f6d068d676d5b34ba4f8844e20934f5eefe24d6e0f637b61a91d1d7885
                                                                          • Opcode Fuzzy Hash: a60bffa59aa4d84220f829e3780c962f4c1ddd143b69d8d3f710ee6b42b2140d
                                                                          • Instruction Fuzzy Hash: 81F0C2B67043441BD721966EE88495BBFABFB9256430404AED505CB311EE24FC058BD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: dcfcfc2462234744138084ccecf3ef687b1b63bcac06fafc3eb36473f28ce2c0
                                                                          • Instruction ID: 0d6b768053a852f5db6a04ab06c2914d89bf931d7bd00bf5ca9c6212cb10f05c
                                                                          • Opcode Fuzzy Hash: dcfcfc2462234744138084ccecf3ef687b1b63bcac06fafc3eb36473f28ce2c0
                                                                          • Instruction Fuzzy Hash: F8F0C8343046418BD7239B39B41459DBFA2EF9AA5134580BECC468B763DF349C0687D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac81ab9e3e0de5a5cadaa59cf658406e4d418d847c6c4d24a22ed6715a32fe69
                                                                          • Instruction ID: 89a66f39bdeb717e582ce7ea7cee6d3feabe556ed9e3a26949df38c880e832bb
                                                                          • Opcode Fuzzy Hash: ac81ab9e3e0de5a5cadaa59cf658406e4d418d847c6c4d24a22ed6715a32fe69
                                                                          • Instruction Fuzzy Hash: FFF027753003041B9B209A6EE884C5BBFDFFBD05603004469E509CB310DE64FC058BD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 703a463a618a0cde4b1f4d5442805bc5cd1711b5b93b6376e06471fc2a02e7d0
                                                                          • Instruction ID: dc80186f4c93ed51dfc6ddb9ed95324ef40449062481b39e1cc4b9edbb929eb3
                                                                          • Opcode Fuzzy Hash: 703a463a618a0cde4b1f4d5442805bc5cd1711b5b93b6376e06471fc2a02e7d0
                                                                          • Instruction Fuzzy Hash: 4AF0E5347417547BC3256615A804B5ABFAA9FCBA10F1000AAE5498B391CE61BC02C794
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 58c8a7b65afab08f4ed9f82ba6779d791ffe27ec925c64556781731ade81561a
                                                                          • Instruction ID: e510085c8ce2d6890f5ffd9feaad04c4f9a50c84eccf9b874c489a7ab87fc97f
                                                                          • Opcode Fuzzy Hash: 58c8a7b65afab08f4ed9f82ba6779d791ffe27ec925c64556781731ade81561a
                                                                          • Instruction Fuzzy Hash: 8FF082353006119B9B22DE2EA40855EB797EBD9A61390803DD80A87725DF34AD054BD6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 61174af5d7ab985f056ecfe863be7112d0c34081369e28a73699944fdd63ffdb
                                                                          • Instruction ID: 6ffaa5bb1f5be26d4e126bea45b3dff5905c27bf527ea56b5e3c72eebd3ddfa1
                                                                          • Opcode Fuzzy Hash: 61174af5d7ab985f056ecfe863be7112d0c34081369e28a73699944fdd63ffdb
                                                                          • Instruction Fuzzy Hash: E5F04970D0021A9FCB64DFADC8966AEBBF0AB08720F604A5DE124E7391D770D6418F90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 96b463766331f72754b375fcaf6c470d0e9b206a50f53a8badf885daffc031ff
                                                                          • Instruction ID: 0b2cd76895643ea6d7c2732032bae2a23600b0e2a1c86d15fa49913541f6b6ac
                                                                          • Opcode Fuzzy Hash: 96b463766331f72754b375fcaf6c470d0e9b206a50f53a8badf885daffc031ff
                                                                          • Instruction Fuzzy Hash: DFF03AB0D0020ADFDB64DFADD846A6EBBF0AB08760F204A9DE528E7391D771D5418F91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4ddcafc1c03f4829844a7fb8791a6598c197a34f1b32b6b6582eb55e78baa20f
                                                                          • Instruction ID: 72773174e0104862eda1c1de16a7e66229fcac12a09cbccb547126ed50a3becd
                                                                          • Opcode Fuzzy Hash: 4ddcafc1c03f4829844a7fb8791a6598c197a34f1b32b6b6582eb55e78baa20f
                                                                          • Instruction Fuzzy Hash: 8FF0A0353043148BD7059B29E444758BBE3FF88210F18816DE44583359CA32AC428B84
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ea09e68288f293f14fcf8431385943c948dcc9498530b8a39afa8c05fcc6f6d7
                                                                          • Instruction ID: 58505c3d913a4319fa398e2af0042b1128fd2dd075c70027713a053a4ed0ef3b
                                                                          • Opcode Fuzzy Hash: ea09e68288f293f14fcf8431385943c948dcc9498530b8a39afa8c05fcc6f6d7
                                                                          • Instruction Fuzzy Hash: 51F06D70E083489FDF51DFB8E45859CBFB1EF5A201F0145EAD409EB360DA341A49CB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9dc2e075b011ef8cef059cffc65510c2d816c84e84e73ddbed03db2493a9f964
                                                                          • Instruction ID: e941e9fbbd988984ac5c55fad1825c1467f45c3a8efaa8dc1cb7f27d5639f478
                                                                          • Opcode Fuzzy Hash: 9dc2e075b011ef8cef059cffc65510c2d816c84e84e73ddbed03db2493a9f964
                                                                          • Instruction Fuzzy Hash: 16F0F870D0420A9FCB50DFA8D5466AEBFF4AB09750F5006ADE518E3391D77296408FC1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5a07bc3996f1a7ae9b43c3ccb36a6d7111eceb12c1b09ba3309bf2efbf566755
                                                                          • Instruction ID: 8b9fd05e3b023df00e5277caa57c9ba988f97536967db297ce95ad0cb3075cd4
                                                                          • Opcode Fuzzy Hash: 5a07bc3996f1a7ae9b43c3ccb36a6d7111eceb12c1b09ba3309bf2efbf566755
                                                                          • Instruction Fuzzy Hash: 44E0DF30741B147BC3256615A804F1ABBAAABCAA20F204069E5098B380CE61BC02C784
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d2eebd4af70c41a674b7c313405306a5867674be4cfceefe53f5f29e03573a57
                                                                          • Instruction ID: 9574a49b82eb895882f9f5d4750ae775420cfe2d9ee3e581c0b6c04ef3bc390c
                                                                          • Opcode Fuzzy Hash: d2eebd4af70c41a674b7c313405306a5867674be4cfceefe53f5f29e03573a57
                                                                          • Instruction Fuzzy Hash: A1F03A70D0465BCECB50DFA8C5466AEFFB0AB05750F5006ADE014E3391D77196418F80
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c10640b3210bf9032d69ca8049a5321b4d2b22231c9144950d176394375c70f4
                                                                          • Instruction ID: 8d48c3fac2f763d0e20f0836881f59a620500f983b44aa4992f0bb03d787c5d1
                                                                          • Opcode Fuzzy Hash: c10640b3210bf9032d69ca8049a5321b4d2b22231c9144950d176394375c70f4
                                                                          • Instruction Fuzzy Hash: 3EE02D8E51E3C00FC7038A65AC616D97F761A93955B9B40D7C0E0CF2F3C54A581E8736
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac00d13a93d6500ae77620d815964442328b4c5618b04b165bdc62d3e36c42e1
                                                                          • Instruction ID: 0d42e6e7bcc95f54a7a04f16adbcdf155fd24187cf5e65c3ef1727d2cfc11cde
                                                                          • Opcode Fuzzy Hash: ac00d13a93d6500ae77620d815964442328b4c5618b04b165bdc62d3e36c42e1
                                                                          • Instruction Fuzzy Hash: 91E04874900108EFCB10DFADE9056ADBBF5EB94611F1141ADD905D7224DA315E425F51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 818d0f46a83382e6f3eb6555ce45a1a2798b2ab7f4c05bfde0f9e15e67692885
                                                                          • Instruction ID: 9deb8ec28102d35005613d50fa3905f120f0eb1a198d1db659655af76f1b233a
                                                                          • Opcode Fuzzy Hash: 818d0f46a83382e6f3eb6555ce45a1a2798b2ab7f4c05bfde0f9e15e67692885
                                                                          • Instruction Fuzzy Hash: 21E026B1A05348EFCB01DFA4E88548D7FF4EB06200B0240EAD808DB315EA312F1197E6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8cac941ddd16f728269eed364c71b435b53f7cade9d9e2f831b6a624d61c6238
                                                                          • Instruction ID: 8186a37d70723b957a8e605e4eb751089765a8a949efba44e7c252131f24e0bf
                                                                          • Opcode Fuzzy Hash: 8cac941ddd16f728269eed364c71b435b53f7cade9d9e2f831b6a624d61c6238
                                                                          • Instruction Fuzzy Hash: D8E092317056508FC71A9F78A11455E3BE2EB5921131204FBE845CB361DE35ED41CB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 295d24affca1deff713a263d4b97d741cbed6f767cd09494be9a8a6d3d22f928
                                                                          • Instruction ID: 8c9e91ba75a2f61f8dbc354819868305b37816d8e9f1b7f08a84910f4ca194bb
                                                                          • Opcode Fuzzy Hash: 295d24affca1deff713a263d4b97d741cbed6f767cd09494be9a8a6d3d22f928
                                                                          • Instruction Fuzzy Hash: D0E02653E081948FE311836C5C914A07FB4C623B0938902CDD8098F135E112F90AE392
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 279228891a1e16c4b06e77a555d94f6e3555120874770adb40cd0048244c906c
                                                                          • Instruction ID: 095b46044f8fe8002461b05520e4be3f564adf1ede0a965606e758f77ac329a2
                                                                          • Opcode Fuzzy Hash: 279228891a1e16c4b06e77a555d94f6e3555120874770adb40cd0048244c906c
                                                                          • Instruction Fuzzy Hash: 11E0DF34A0A388EFCB20DFB8E94108CBFB4EB82200B0000EAD448D7262EA306E009B51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 42abf6bb8b160ad17425cd09553df28fb25ef3c4ccef384a78707ee57b3cb177
                                                                          • Instruction ID: cf437e8f8e316d07907e1c15f9aae79e8f78e23cd17f09fdda58661f19090c90
                                                                          • Opcode Fuzzy Hash: 42abf6bb8b160ad17425cd09553df28fb25ef3c4ccef384a78707ee57b3cb177
                                                                          • Instruction Fuzzy Hash: 2BE0B674E0430CAFDB54EFB8E44599DBBF5AF48301F0081A9E809E7350EA346A05CF81
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7daea1dbb061164695d00481d6599b2acd881849b0444012b1cb3e25f9296e26
                                                                          • Instruction ID: d0d1601397093d04ae99d74ff7cd90a8e71bc1e99c08c351b7f554c2d76cf127
                                                                          • Opcode Fuzzy Hash: 7daea1dbb061164695d00481d6599b2acd881849b0444012b1cb3e25f9296e26
                                                                          • Instruction Fuzzy Hash: 41D05E70A0520CFFCB10EFAEE90055DBBF9EB44610B5141EDD809D7224EE316F009B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fd1d2d3903e74640c86a6ef1bf341f73670ff63b75f1b8ad0caf3c258a79c854
                                                                          • Instruction ID: af4ef7afb61d680966ad2a873babb62fe7a5266666a7c38d14d6b1981e38b487
                                                                          • Opcode Fuzzy Hash: fd1d2d3903e74640c86a6ef1bf341f73670ff63b75f1b8ad0caf3c258a79c854
                                                                          • Instruction Fuzzy Hash: 20D0A971809B880FC3228FE19A86298BF309EA3101B4616DBD888CF372C4668D468342
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f2ec7538dccb8e7349c16c341ec92d130078f8b2f5cb7a88feb5c098cb3945f8
                                                                          • Instruction ID: 5f11364739600958d3225f422a0603b12ddd9bc8ae8dee7e78b6b21cc7766fde
                                                                          • Opcode Fuzzy Hash: f2ec7538dccb8e7349c16c341ec92d130078f8b2f5cb7a88feb5c098cb3945f8
                                                                          • Instruction Fuzzy Hash: 51D05E71A0120CEFCB40EFA9E94295DBBF9EB45611B5045E9D808D7214EE327F109B95
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 63de0188c035748fe85d00d8b52d1d44fd860753b8de04162c42bd10c6f77094
                                                                          • Instruction ID: 8ac95d8642e161f7f1fec686d84fb780fef08b1ee9ea7d5a3d25466b6ae4b049
                                                                          • Opcode Fuzzy Hash: 63de0188c035748fe85d00d8b52d1d44fd860753b8de04162c42bd10c6f77094
                                                                          • Instruction Fuzzy Hash: E8D01770A0220DEFCB50EFA9E94159DBBF9FB84210B1041E9950CD7214EA316F009B81
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 57af6486f447a01d0292b96374c548f126515011216240b989e63f796d5a28ab
                                                                          • Instruction ID: d294e80378615240891ef95b7eaae5d3f4901047764f906e95b61ccb79a79873
                                                                          • Opcode Fuzzy Hash: 57af6486f447a01d0292b96374c548f126515011216240b989e63f796d5a28ab
                                                                          • Instruction Fuzzy Hash: EAC04CB762000077CB04CE34DD65B52B756EBA6309F78D899E815CB391DB73F9038640
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3273aac4b0300dec54948b42f008a7595472259e9c2f8ea2cbf61457c9a2884e
                                                                          • Instruction ID: 6209d4a78f6ecdc91b698fb7dbbb5b840d4d093fb980ec95cd5c83489bb5967c
                                                                          • Opcode Fuzzy Hash: 3273aac4b0300dec54948b42f008a7595472259e9c2f8ea2cbf61457c9a2884e
                                                                          • Instruction Fuzzy Hash: F7D012E190D3C14FCB435F2898657AD3F706B222B4B4A57DBC0E48F1E3D6189905E761
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ae34cf6241dc8a8cad894ef7d8e1d030b24e20bf2fff7a4285000ea49d1594f6
                                                                          • Instruction ID: 1cca5c715b195e26b292c374490afec53b564416c7a78352e94b46f675df5310
                                                                          • Opcode Fuzzy Hash: ae34cf6241dc8a8cad894ef7d8e1d030b24e20bf2fff7a4285000ea49d1594f6
                                                                          • Instruction Fuzzy Hash: 80D0927088560ECBEB248F80D05A7EEBFB0FB04325F280459D022B5290C7B92189DFD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ffd1a26efb0179702f040ce62b20283cf2eb36ffa2229ea4c0c08cffc1b0dde1
                                                                          • Instruction ID: 2562be471b65f15484d1352cfe2c7b91c66982d157a770adcfe5d7f5a1c2b7e2
                                                                          • Opcode Fuzzy Hash: ffd1a26efb0179702f040ce62b20283cf2eb36ffa2229ea4c0c08cffc1b0dde1
                                                                          • Instruction Fuzzy Hash: A6D0927088560ECBEB208F80D05ABEEBFB0FB04315F280459D122B92D0CBB82189DFD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 720180e790807e3ede44b7aaeafb8c5a88dcefb2102d0f3586cf75493f898eb3
                                                                          • Instruction ID: 7aca5bfd981a0f045e72b329dfc390df16fdb7603726f323f6f71d62a31b6ba1
                                                                          • Opcode Fuzzy Hash: 720180e790807e3ede44b7aaeafb8c5a88dcefb2102d0f3586cf75493f898eb3
                                                                          • Instruction Fuzzy Hash: 1AD0927088560ECFEB218F80D15ABEEBFB1FB04315F280459D022B5290C7B82189DFD4
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ab60894d2199e89733b1eab83f1d990589e8bfd18f485fef228a41f0494e9807
                                                                          • Instruction ID: 847e58dc5ac384dfc1f51fad0fcd4299707af36711b55d19b23f2e0a076feeaf
                                                                          • Opcode Fuzzy Hash: ab60894d2199e89733b1eab83f1d990589e8bfd18f485fef228a41f0494e9807
                                                                          • Instruction Fuzzy Hash: 32D0927088560ECBEB248F80D15A7EEBFB1FB04315F280459D022B5290C7B82189DFD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b6b4426739cdedca741cc18267bbeef66825e3010fe727eda4eebb44daa5b32a
                                                                          • Instruction ID: 8b3738947dd59f884f81120ea026efc6f09bcbaab09e9e1975b1333a2a3adf91
                                                                          • Opcode Fuzzy Hash: b6b4426739cdedca741cc18267bbeef66825e3010fe727eda4eebb44daa5b32a
                                                                          • Instruction Fuzzy Hash: 0EC0123216C3951FC702676CB4548083F31DA11121B0503A2B429890F6D9186949EB19
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2a5b7d474703143b83200e15ee7cc103a43597f9dd80ad9c2d421280b5843f85
                                                                          • Instruction ID: 161f4562b90d8b05f106102c128d13b5a3cf6a76e172356495d6d5e787b7ec56
                                                                          • Opcode Fuzzy Hash: 2a5b7d474703143b83200e15ee7cc103a43597f9dd80ad9c2d421280b5843f85
                                                                          • Instruction Fuzzy Hash: 42B0927090530CAF8620DAA9980195AB7ACDA0A211B4001D9F90887320D972AA1157D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c2e4ab6525e10e8ab8ae78bdb571b13d8221153dfcdb0ef9d14387e3c21d0efd
                                                                          • Instruction ID: 0800d6ef20751a3f19d350c911e900933dd87db72e2937d57802f514e71d324c
                                                                          • Opcode Fuzzy Hash: c2e4ab6525e10e8ab8ae78bdb571b13d8221153dfcdb0ef9d14387e3c21d0efd
                                                                          • Instruction Fuzzy Hash: 75C0483AE00009CBCF10DE84F8858DCFB31FB8422AB208162E619A35108A312A6B8B81
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2331235e5e8340353ca5a1062d7df19a50b5d2bd25f848292116f1045d185fc7
                                                                          • Instruction ID: 2521e95e159108cc22f978b0bb05f891e742740905322696ba66ac74b474875d
                                                                          • Opcode Fuzzy Hash: 2331235e5e8340353ca5a1062d7df19a50b5d2bd25f848292116f1045d185fc7
                                                                          • Instruction Fuzzy Hash: F1C08C32A0C9404BCB20C728C88675EFB71BF80300F2A806ED5A543644CA30B801CF89
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1393014875.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b70000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: dcf9fb54e5faafcbaad9bd873739532c2543712c52c209b7ff24ac4c42b7b3f9
                                                                          • Instruction ID: cb24a7c74409f015b9f2e858faa9392db36fe836d2d4c3ec9a0f532f773bea73
                                                                          • Opcode Fuzzy Hash: dcf9fb54e5faafcbaad9bd873739532c2543712c52c209b7ff24ac4c42b7b3f9
                                                                          • Instruction Fuzzy Hash: B1C04C3590D7908BC3169B3084190127F326FA210579948DDC8914A252DB3EF816C752
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1345747510.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_17c0000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bca9dde8ae68333eaa9c5d99613f9145bf7fe37ffc000efcb4192f824cf50e3a
                                                                          • Instruction ID: 57e65f4097c9c2a09db3fad19eff4709f4437b93ed4fef64bb519b0bc2991c95
                                                                          • Opcode Fuzzy Hash: bca9dde8ae68333eaa9c5d99613f9145bf7fe37ffc000efcb4192f824cf50e3a
                                                                          • Instruction Fuzzy Hash: 6AB0123107472E4FD6407754F419D147F6DE6402067810111F90D0E435DE687C49468D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1392852591.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5b50000_dMDImIGmc7.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Hq$Hq
                                                                          • API String ID: 0-925789375
                                                                          • Opcode ID: e4119b270f30a67935bccb2245a8db13a846a51e019b689d6a1b7a88021bc816
                                                                          • Instruction ID: a4498dfa1b574b9bb6c7c865b80260fe6be7c008d2fb2b994eefdb0af2dfc698
                                                                          • Opcode Fuzzy Hash: e4119b270f30a67935bccb2245a8db13a846a51e019b689d6a1b7a88021bc816
                                                                          • Instruction Fuzzy Hash: A6E14F31E107599FCB05DFA9C8405DEFBB1FF99310F25865AE415BB214EB30AA86CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.1365377437.0000000002FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FAD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_2fad000_rundll32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1a07cf731b8e69ca277f481cb7c59d0d9a3ea310d418646f0736bb68f0308b22
                                                                          • Instruction ID: c81ca584630dee4ef9cea84ef5bd65500bc084791300c00c715ab260358ea56d
                                                                          • Opcode Fuzzy Hash: 1a07cf731b8e69ca277f481cb7c59d0d9a3ea310d418646f0736bb68f0308b22
                                                                          • Instruction Fuzzy Hash: 3D012BB19083409EE7204A25CCD5B67BF98DF41AA5F18C51ADE480F686C3789846CAB5
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.1365377437.0000000002FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FAD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_2fad000_rundll32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 816465870b23a4ba454adfbcd81eddba9f6471fa099dbffc709ad7b033b3af74
                                                                          • Instruction ID: 49bdc2e09a377606e7c6ef5c08817e647b4b766dd2ebc7cd700aa0f804f403f1
                                                                          • Opcode Fuzzy Hash: 816465870b23a4ba454adfbcd81eddba9f6471fa099dbffc709ad7b033b3af74
                                                                          • Instruction Fuzzy Hash: 35019E6140E3C09FE7128B2588A8B56BFB4DF53624F1DC1DBD9888F2A7C2695849C772

                                                                          Execution Graph

                                                                          Execution Coverage:13.8%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0.8%
                                                                          Total number of Nodes:394
                                                                          Total number of Limit Nodes:18
                                                                          execution_graph 48944 40c5ea8 48945 40c5ecc 48944->48945 48947 40c5edc 48944->48947 48946 40c5ed5 48945->48946 48950 40c646d 3 API calls 48945->48950 48951 40c64d8 3 API calls 48945->48951 48952 40c646d 48947->48952 48960 40c64d8 48947->48960 48950->48945 48951->48945 48954 40c647d 48952->48954 48953 40c6504 48953->48945 48955 40c64fb 48954->48955 48956 1a9f901 3 API calls 48954->48956 48957 1a9f910 3 API calls 48954->48957 48955->48953 48958 1a9f901 3 API calls 48955->48958 48959 1a9f910 3 API calls 48955->48959 48956->48955 48957->48955 48958->48955 48959->48955 48962 40c650b 48960->48962 48963 40c64fb 48960->48963 48961 40c6504 48961->48945 48964 1a9f901 3 API calls 48962->48964 48965 1a9f910 3 API calls 48962->48965 48963->48961 48966 1a9f901 3 API calls 48963->48966 48967 1a9f910 3 API calls 48963->48967 48964->48963 48965->48963 48966->48963 48967->48963 48770 57d2038 48771 57d203d ConnectNamedPipe 48770->48771 48773 57d20c8 48771->48773 48773->48773 49237 57d5d88 49238 57d5d89 WaitNamedPipeW 49237->49238 49240 57d5e04 49238->49240 48774 1a936b0 48775 1a936b1 48774->48775 48781 1a94c6e 48775->48781 48776 1a93764 48777 1a936cc 48777->48776 48786 1a9e5c6 48777->48786 48778 1a93739 48783 1a94c90 48781->48783 48782 1a94cc6 48782->48777 48783->48782 48784 1a94d1d RtlGetVersion 48783->48784 48785 1a94dda 48784->48785 48785->48777 48787 1a9e5f4 48786->48787 48788 1a9e60e 48786->48788 48787->48788 48791 1a9ea88 48787->48791 48795 1a9ea77 48787->48795 48788->48778 48793 1a9eaae 48791->48793 48792 1a9eae6 48792->48788 48793->48792 48799 1a9eb31 48793->48799 48797 1a9eaae 48795->48797 48796 1a9eae6 48796->48788 48797->48796 48798 1a9eb31 3 API calls 48797->48798 48798->48796 48800 1a9eb6e 48799->48800 48807 1a9f768 48800->48807 48812 1a9f758 48800->48812 48801 1a9ee0f 48802 1a9ed97 48802->48801 48817 40c0988 48802->48817 48821 40c0962 48802->48821 48808 1a9f793 48807->48808 48809 1a9f78c 48807->48809 48808->48802 48809->48808 48825 1a9f901 48809->48825 48839 1a9f910 48809->48839 48814 1a9f767 48812->48814 48813 1a9f793 48813->48802 48814->48813 48815 1a9f901 3 API calls 48814->48815 48816 1a9f910 3 API calls 48814->48816 48815->48813 48816->48813 48818 40c09ad 48817->48818 48819 40c0448 3 API calls 48818->48819 48820 40c09c5 48819->48820 48820->48802 48822 40c096f 48821->48822 48823 40c0448 3 API calls 48822->48823 48824 40c09c5 48823->48824 48824->48802 48827 1a9f910 48825->48827 48826 1a9f93c 48826->48808 48832 1a9f933 48827->48832 48833 1a9f901 3 API calls 48827->48833 48837 1a9f910 3 API calls 48827->48837 48853 1a9fa88 48827->48853 48869 1a9a4c8 48827->48869 48874 40c4820 48827->48874 48881 1a9fa98 48827->48881 48896 40c4830 48827->48896 48903 1a9a4b8 48827->48903 48828 40c4820 3 API calls 48828->48832 48829 40c4830 3 API calls 48829->48832 48832->48826 48832->48828 48832->48829 48833->48832 48837->48832 48840 1a9f943 48839->48840 48842 1a9f933 48839->48842 48840->48842 48845 1a9a4c8 3 API calls 48840->48845 48846 1a9fa88 3 API calls 48840->48846 48847 1a9f901 3 API calls 48840->48847 48848 40c4820 3 API calls 48840->48848 48849 1a9a4b8 3 API calls 48840->48849 48850 1a9fa98 3 API calls 48840->48850 48851 1a9f910 3 API calls 48840->48851 48852 40c4830 3 API calls 48840->48852 48841 1a9f93c 48841->48808 48842->48841 48843 40c4820 3 API calls 48842->48843 48844 40c4830 3 API calls 48842->48844 48843->48842 48844->48842 48845->48842 48846->48842 48847->48842 48848->48842 48849->48842 48850->48842 48851->48842 48852->48842 48854 1a9fa98 48853->48854 48855 1a9fabb 48854->48855 48857 1a9facb 48854->48857 48856 1a9fac4 48855->48856 48865 1a9fa88 3 API calls 48855->48865 48866 1a9fa98 3 API calls 48855->48866 48867 1a9f901 3 API calls 48855->48867 48868 1a9f910 3 API calls 48855->48868 48856->48832 48859 1a9fa88 3 API calls 48857->48859 48860 1a9fa98 3 API calls 48857->48860 48861 1a9f901 3 API calls 48857->48861 48862 1a9f910 3 API calls 48857->48862 48858 1a9fb0c 48858->48856 48908 1a9ff20 48858->48908 48913 1a9ff12 48858->48913 48859->48858 48860->48858 48861->48858 48862->48858 48865->48858 48866->48858 48867->48858 48868->48858 48870 1a9a4f9 48869->48870 48871 1a9a4ed 48869->48871 48870->48871 48872 40c4820 3 API calls 48870->48872 48873 40c4830 3 API calls 48870->48873 48871->48832 48872->48871 48873->48871 48876 40c4864 48874->48876 48877 40c4854 48874->48877 48875 40c485d 48875->48832 48879 1a9f901 3 API calls 48876->48879 48880 1a9f910 3 API calls 48876->48880 48877->48875 48940 40c6670 48877->48940 48879->48877 48880->48877 48882 1a9fabb 48881->48882 48883 1a9facb 48881->48883 48889 1a9fac4 48882->48889 48892 1a9fa88 3 API calls 48882->48892 48893 1a9fa98 3 API calls 48882->48893 48894 1a9f901 3 API calls 48882->48894 48895 1a9f910 3 API calls 48882->48895 48885 1a9fa88 3 API calls 48883->48885 48886 1a9fa98 3 API calls 48883->48886 48887 1a9f901 3 API calls 48883->48887 48888 1a9f910 3 API calls 48883->48888 48884 1a9fb0c 48884->48889 48890 1a9ff20 3 API calls 48884->48890 48891 1a9ff12 3 API calls 48884->48891 48885->48884 48886->48884 48887->48884 48888->48884 48889->48832 48890->48889 48891->48889 48892->48884 48893->48884 48894->48884 48895->48884 48898 40c4864 48896->48898 48899 40c4854 48896->48899 48897 40c485d 48897->48832 48901 1a9f901 3 API calls 48898->48901 48902 1a9f910 3 API calls 48898->48902 48899->48897 48900 40c6670 3 API calls 48899->48900 48900->48897 48901->48899 48902->48899 48904 1a9a4f9 48903->48904 48905 1a9a4ed 48903->48905 48904->48905 48906 40c4820 3 API calls 48904->48906 48907 40c4830 3 API calls 48904->48907 48905->48832 48906->48905 48907->48905 48909 1a9ff3f 48908->48909 48918 40c0448 48909->48918 48922 40c0438 48909->48922 48910 1a9ffb1 48910->48856 48914 1a9ff3f 48913->48914 48916 40c0438 3 API calls 48914->48916 48917 40c0448 3 API calls 48914->48917 48915 1a9ffb1 48915->48856 48916->48915 48917->48915 48919 40c046e 48918->48919 48927 57d1270 48918->48927 48931 57d1260 48918->48931 48919->48910 48923 40c043b 48922->48923 48924 40c046e 48923->48924 48925 57d1270 3 API calls 48923->48925 48926 57d1260 3 API calls 48923->48926 48924->48910 48925->48924 48926->48924 48928 57d1282 48927->48928 48929 57d12a5 48928->48929 48935 57d12b0 48928->48935 48929->48919 48932 57d1270 48931->48932 48933 57d12a5 48932->48933 48934 57d12b0 3 API calls 48932->48934 48933->48919 48934->48933 48936 57d12b4 48935->48936 48938 57d14e0 CreateNamedPipeW CreateNamedPipeW 48936->48938 48939 57d14d0 CreateNamedPipeW CreateNamedPipeW 48936->48939 48937 57d1318 48937->48929 48938->48937 48939->48937 48941 40c66b0 48940->48941 48942 40c0448 3 API calls 48941->48942 48943 40c66cb 48942->48943 48943->48875 48968 5293700 48969 5293710 48968->48969 48970 5293720 48969->48970 48973 52937b0 48969->48973 48990 5293855 48969->48990 48974 5293825 48973->48974 48989 52937ba 48973->48989 48974->48970 48989->48974 49007 52941a9 48989->49007 49012 5295077 48989->49012 49017 57d09e0 48989->49017 49021 529ae90 48989->49021 49025 52982f0 48989->49025 49031 52941b8 48989->49031 49036 57d09d1 48989->49036 49040 57d0bb6 48989->49040 49044 529ae83 48989->49044 49048 5295083 48989->49048 49053 5298300 48989->49053 49059 57d0c39 48989->49059 49063 57d0ebc 48989->49063 49067 5294fe9 48989->49067 48991 52937c5 48990->48991 48992 5293825 48991->48992 48993 52941a9 2 API calls 48991->48993 48994 5294fe9 2 API calls 48991->48994 48995 57d0ebc 3 API calls 48991->48995 48996 57d0c39 3 API calls 48991->48996 48997 5298300 3 API calls 48991->48997 48998 5295083 2 API calls 48991->48998 48999 529ae83 CreateProcessAsUserW 48991->48999 49000 57d0bb6 3 API calls 48991->49000 49001 57d09d1 3 API calls 48991->49001 49002 52941b8 2 API calls 48991->49002 49003 52982f0 3 API calls 48991->49003 49004 529ae90 CreateProcessAsUserW 48991->49004 49005 57d09e0 3 API calls 48991->49005 49006 5295077 2 API calls 48991->49006 48992->48970 48993->48992 48994->48992 48995->48992 48996->48992 48997->48992 48998->48992 48999->48992 49000->48992 49001->48992 49002->48992 49003->48992 49004->48992 49005->48992 49006->48992 49008 52941b8 49007->49008 49009 52947ab 49008->49009 49072 5296ab9 49008->49072 49077 5296ac8 49008->49077 49009->48974 49013 529428b 49012->49013 49014 52947ab 49013->49014 49015 5296ab9 2 API calls 49013->49015 49016 5296ac8 2 API calls 49013->49016 49014->48974 49015->49013 49016->49013 49018 57d09e1 49017->49018 49019 57d0add 49018->49019 49020 40c6670 3 API calls 49018->49020 49020->49019 49022 529aeb9 49021->49022 49023 529af19 49022->49023 49090 529fa68 49022->49090 49023->48974 49026 5298313 49025->49026 49027 529835b 49026->49027 49095 529836b 49026->49095 49100 5298563 49026->49100 49105 5298570 49026->49105 49027->48974 49032 52941f4 49031->49032 49033 52947ab 49032->49033 49034 5296ab9 2 API calls 49032->49034 49035 5296ac8 2 API calls 49032->49035 49033->48974 49034->49032 49035->49032 49037 57d09d8 49036->49037 49038 57d0add 49037->49038 49039 40c6670 3 API calls 49037->49039 49039->49038 49041 57d0a50 49040->49041 49042 57d0add 49041->49042 49043 40c6670 3 API calls 49041->49043 49043->49042 49046 529ae90 49044->49046 49045 529af19 49045->48974 49046->49045 49047 529fa68 CreateProcessAsUserW 49046->49047 49047->49046 49049 529428b 49048->49049 49050 52947ab 49049->49050 49051 5296ab9 2 API calls 49049->49051 49052 5296ac8 2 API calls 49049->49052 49050->48974 49051->49049 49052->49049 49055 5298313 49053->49055 49054 529835b 49054->48974 49055->49054 49056 529836b 3 API calls 49055->49056 49057 5298570 3 API calls 49055->49057 49058 5298563 3 API calls 49055->49058 49056->49055 49057->49055 49058->49055 49060 57d0a50 49059->49060 49061 57d0add 49060->49061 49062 40c6670 3 API calls 49060->49062 49062->49061 49064 57d0a50 49063->49064 49065 57d0add 49064->49065 49066 40c6670 3 API calls 49064->49066 49066->49065 49068 529428b 49067->49068 49069 52947ab 49068->49069 49070 5296ab9 2 API calls 49068->49070 49071 5296ac8 2 API calls 49068->49071 49069->48974 49070->49068 49071->49068 49073 5296af8 49072->49073 49074 5296af1 49072->49074 49073->49008 49074->49073 49082 5cd2b15 49074->49082 49086 5cd2d40 49074->49086 49078 5296af8 49077->49078 49079 5296af1 49077->49079 49078->49008 49079->49078 49080 5cd2b15 RegDisablePredefinedCache 49079->49080 49081 5cd2d40 RegDisablePredefinedCache 49079->49081 49080->49079 49081->49079 49083 5cd2d9a 49082->49083 49084 5cd2df9 RegDisablePredefinedCache 49083->49084 49085 5cd2ddc 49083->49085 49084->49085 49085->49074 49087 5cd2d9a 49086->49087 49088 5cd2df9 RegDisablePredefinedCache 49087->49088 49089 5cd2ddc 49087->49089 49088->49089 49089->49074 49091 529fa6c 49090->49091 49092 529fa02 CreateProcessAsUserW 49091->49092 49094 529fa77 49091->49094 49093 529fa34 49092->49093 49093->49022 49096 52983a4 49095->49096 49097 529857b 49096->49097 49109 52991a0 49096->49109 49114 5299144 49096->49114 49097->49026 49102 52984fa 49100->49102 49101 529857b 49101->49026 49102->49100 49102->49101 49103 52991a0 3 API calls 49102->49103 49104 5299144 3 API calls 49102->49104 49103->49101 49104->49101 49106 529857b 49105->49106 49107 52991a0 3 API calls 49105->49107 49108 5299144 3 API calls 49105->49108 49106->49026 49107->49106 49108->49106 49110 52991dd 49109->49110 49111 52991e1 49110->49111 49119 529bd0a 49110->49119 49128 529baa6 49110->49128 49111->49097 49115 529914a 49114->49115 49116 52991e1 49115->49116 49117 529bd0a 3 API calls 49115->49117 49118 529baa6 3 API calls 49115->49118 49116->49097 49117->49116 49118->49116 49121 529bb79 49119->49121 49120 529bd39 49120->49111 49121->49120 49137 529d6db 49121->49137 49145 529e037 49121->49145 49151 529d710 49121->49151 49159 529e02e 49121->49159 49165 529d99f 49121->49165 49171 529d6af 49121->49171 49130 529bab0 49128->49130 49129 529bd39 49129->49111 49130->49129 49131 529d6db 3 API calls 49130->49131 49132 529d6af 3 API calls 49130->49132 49133 529d99f 2 API calls 49130->49133 49134 529e02e 2 API calls 49130->49134 49135 529d710 3 API calls 49130->49135 49136 529e037 2 API calls 49130->49136 49131->49130 49132->49130 49133->49130 49134->49130 49135->49130 49136->49130 49138 529d6d6 49137->49138 49140 529d8d7 49138->49140 49179 529ea0f 49138->49179 49139 529e11e 49139->49139 49184 57d5b70 49140->49184 49190 57d5bc0 49140->49190 49196 57d5baf 49140->49196 49146 529e042 49145->49146 49148 57d5baf 2 API calls 49146->49148 49149 57d5b70 2 API calls 49146->49149 49150 57d5bc0 2 API calls 49146->49150 49147 529e11e 49147->49147 49148->49147 49149->49147 49150->49147 49152 529d741 49151->49152 49153 529d8d7 49152->49153 49155 529ea0f CreateProcessAsUserW 49152->49155 49156 57d5baf 2 API calls 49153->49156 49157 57d5b70 2 API calls 49153->49157 49158 57d5bc0 2 API calls 49153->49158 49154 529e11e 49155->49153 49156->49154 49157->49154 49158->49154 49160 529e091 49159->49160 49162 57d5baf 2 API calls 49160->49162 49163 57d5b70 2 API calls 49160->49163 49164 57d5bc0 2 API calls 49160->49164 49161 529e11e 49161->49161 49162->49161 49163->49161 49164->49161 49166 529d9ab 49165->49166 49168 57d5baf 2 API calls 49166->49168 49169 57d5b70 2 API calls 49166->49169 49170 57d5bc0 2 API calls 49166->49170 49167 529e11e 49167->49167 49168->49167 49169->49167 49170->49167 49172 529d6b3 49171->49172 49173 529d8d7 49172->49173 49178 529ea0f CreateProcessAsUserW 49172->49178 49175 57d5baf 2 API calls 49173->49175 49176 57d5b70 2 API calls 49173->49176 49177 57d5bc0 2 API calls 49173->49177 49174 529e11e 49174->49174 49175->49174 49176->49174 49177->49174 49178->49173 49180 529ea2f 49179->49180 49202 529ea80 49180->49202 49206 529ea90 49180->49206 49185 57d5b74 49184->49185 49187 57d5b79 49184->49187 49185->49187 49214 57d5d11 49185->49214 49187->49139 49189 57d5d11 2 API calls 49189->49187 49191 57d5bde 49190->49191 49193 57d5bf7 49191->49193 49195 57d5d11 2 API calls 49191->49195 49192 57d5c20 49194 57d5d11 2 API calls 49192->49194 49193->49139 49194->49193 49195->49192 49197 57d5bc0 49196->49197 49199 57d5bf7 49197->49199 49200 57d5d11 2 API calls 49197->49200 49198 57d5c20 49201 57d5d11 2 API calls 49198->49201 49199->49139 49200->49198 49201->49199 49204 529ea90 49202->49204 49210 529d59c 49204->49210 49205 529eb89 49205->49205 49208 529eabb 49206->49208 49207 529d59c CreateProcessAsUserW 49209 529eb89 49207->49209 49208->49207 49209->49209 49211 529f950 CreateProcessAsUserW 49210->49211 49213 529fa34 49211->49213 49213->49205 49215 57d5d14 49214->49215 49219 5cd0579 49215->49219 49224 5cd0580 49215->49224 49220 5cd0580 49219->49220 49229 5cd05c4 49220->49229 49233 5cd05d0 49220->49233 49225 5cd0593 49224->49225 49227 5cd05c4 CreateFileA 49225->49227 49228 5cd05d0 CreateFileA 49225->49228 49226 57d5c20 49226->49189 49227->49226 49228->49226 49232 5cd05c9 CreateFileA 49229->49232 49231 5cd0705 49232->49231 49234 5cd062e CreateFileA 49233->49234 49236 5cd0705 49234->49236 49241 1a97490 49242 1a974ba 49241->49242 49243 1a974d5 49242->49243 49244 1a9f901 3 API calls 49242->49244 49245 1a9f910 3 API calls 49242->49245 49244->49243 49245->49243

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 140 57d14e0-57d1566 150 57d1568-57d156a 140->150 151 57d1571-57d157d 140->151 150->151 153 57d157f-57d1586 151->153 154 57d1588-57d158a 151->154 153->154 155 57d158c-57d1593 153->155 156 57d1598-57d15c0 154->156 157 57d1595 155->157 158 57d15f2-57d1602 155->158 160 57d15c9 156->160 161 57d15c2-57d15c7 156->161 157->156 164 57d1609-57d164a 158->164 165 57d1604-57d1607 158->165 163 57d15ce-57d15e3 call 57d06b4 160->163 161->163 169 57d15e8-57d15ef 163->169 166 57d164c-57d164f 164->166 167 57d1652-57d16b7 CreateNamedPipeW 164->167 165->164 166->167 171 57d16b9-57d16bf 167->171 172 57d16c0-57d16e1 167->172 171->172
                                                                          APIs
                                                                          • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 057D16A4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateNamedPipe
                                                                          • String ID: 4Lq$d/q
                                                                          • API String ID: 2489174969-843946833
                                                                          • Opcode ID: 48b3bcee723c2045736762ddc0790d214070156a27dfeb9cb613dc2ec87f243e
                                                                          • Instruction ID: fdb579f3f12cc9dc1d899f331e12f270cb4efeaa7489b45a41eef957c40d6e0c
                                                                          • Opcode Fuzzy Hash: 48b3bcee723c2045736762ddc0790d214070156a27dfeb9cb613dc2ec87f243e
                                                                          • Instruction Fuzzy Hash: 5461A170A003089FDB10DFA9C844BAEBFF6BF88300F54846AE509EB291D775D905CB61
                                                                          APIs
                                                                          • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0529FA1F
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2624435583.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5290000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcessUser
                                                                          • String ID:
                                                                          • API String ID: 2217836671-0
                                                                          • Opcode ID: 65b210f5fef1adcd409e6ab3edca90e18dd6432b00bbf36aafb5dd5f022e2f7e
                                                                          • Instruction ID: 1b06096e60e51b3b5ce5601ebeca73cef78cec9a4348b018277804ca33b69d7c
                                                                          • Opcode Fuzzy Hash: 65b210f5fef1adcd409e6ab3edca90e18dd6432b00bbf36aafb5dd5f022e2f7e
                                                                          • Instruction Fuzzy Hash: A141207290020AAFDF11CFA9C980ADEBBF2FF48310F14842AE918A7350D775A955CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 40c3220 1 40c3225-40c3249 0->1 3 40c321e 1->3 4 40c324b-40c326d 1->4 3->0 6 40c326f-40c32bb 4->6 7 40c31fa-40c3214 4->7 14 40c32c3-40c32d6 call 40c3589 6->14 16 40c32de-40c3315 14->16 20 40c3358 16->20 21 40c3317-40c332d 16->21 22 40c3360-40c34b3 20->22 24 40c332f 21->24 25 40c3336-40c3356 21->25 54 40c34bb-40c34be 22->54 24->25 25->20 72 40c34c1 call 5292059 54->72 73 40c34c1 call 5292068 54->73 55 40c34c7-40c3585 72->55 73->55
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'q$4'q$4'q$4'q$4'q
                                                                          • API String ID: 0-3272727544
                                                                          • Opcode ID: 6b3e5b677d601083476c3a0caac17a5ee1665da15f4bef2d07e174b1b67455d0
                                                                          • Instruction ID: 125f4dc59e9e565e9abb9724511534de91dbc51801940a9a42404250a84a3a28
                                                                          • Opcode Fuzzy Hash: 6b3e5b677d601083476c3a0caac17a5ee1665da15f4bef2d07e174b1b67455d0
                                                                          • Instruction Fuzzy Hash: 17A1A330A007059FE755DF78D49069EBBF2FF85304B40866CC445AF655DB74B90A8B92

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 74 40c3270-40c3315 call 40c3589 86 40c3358-40c34be 74->86 87 40c3317-40c332d 74->87 137 40c34c1 call 5292059 86->137 138 40c34c1 call 5292068 86->138 90 40c332f 87->90 91 40c3336-40c3356 87->91 90->91 91->86 121 40c34c7-40c3585 137->121 138->121
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'q$4'q$4'q$4'q$4'q
                                                                          • API String ID: 0-3272727544
                                                                          • Opcode ID: 81690dfc02a4dc76917ea86cfa9715e46e406c1b584c65bc70f25e42cef16d57
                                                                          • Instruction ID: c0c6b2279d5b30ff08dc038541b2fdce38e1c9a361a72707dd55fa0c047a5b75
                                                                          • Opcode Fuzzy Hash: 81690dfc02a4dc76917ea86cfa9715e46e406c1b584c65bc70f25e42cef16d57
                                                                          • Instruction Fuzzy Hash: 7B814130A007069FE755EF79D45069EBBE2FF88304B408A2CD545AF754EB71BA098BD2

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 175 1a94c6e-1a94cb3 180 1a94d02-1a94d08 175->180 181 1a94cb5-1a94cc4 call 1a94848 175->181 184 1a94d09-1a94dd8 RtlGetVersion 181->184 185 1a94cc6-1a94ccb 181->185 190 1a94dda-1a94de0 184->190 191 1a94de1-1a94e24 184->191 197 1a94cce call 1a952e8 185->197 198 1a94cce call 1a952f8 185->198 187 1a94cd4 187->180 190->191 195 1a94e2b-1a94e32 191->195 196 1a94e26 191->196 196->195 197->187 198->187
                                                                          APIs
                                                                          • RtlGetVersion.NTDLL(0000009C), ref: 01A94DBE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2598769145.0000000001A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A90000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_1a90000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: Version
                                                                          • String ID: `Qq$`Qq
                                                                          • API String ID: 1889659487-3032102428
                                                                          • Opcode ID: af131f71348c92eae14066f147ba4b5702ef675e6337b7918cd60774cf548dd1
                                                                          • Instruction ID: 13754795ffb1e3f7dfe9ac7a2faed2ccbb84adb7e0c01cfc2a60a1565644a3c5
                                                                          • Opcode Fuzzy Hash: af131f71348c92eae14066f147ba4b5702ef675e6337b7918cd60774cf548dd1
                                                                          • Instruction Fuzzy Hash: 9A419D75E003189FEB609F68D814BAABBF5FB49310F0085A9D508A7280DB755E89CF92

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 489 5cd05c4-5cd062c 492 5cd062e-5cd0653 489->492 493 5cd0680-5cd0703 CreateFileA 489->493 492->493 496 5cd0655-5cd0657 492->496 500 5cd070c-5cd074a 493->500 501 5cd0705-5cd070b 493->501 497 5cd0659-5cd0663 496->497 498 5cd067a-5cd067d 496->498 502 5cd0665 497->502 503 5cd0667-5cd0676 497->503 498->493 508 5cd074c-5cd0750 500->508 509 5cd075a 500->509 501->500 502->503 503->503 504 5cd0678 503->504 504->498 508->509 510 5cd0752 508->510 511 5cd075b 509->511 510->509 511->511
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 05CD06ED
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2626741169.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5cd0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID: 4Lq
                                                                          • API String ID: 823142352-2237474892
                                                                          • Opcode ID: 378e3bfb0e615e7e8741f373bf5242fcf6d5b9bb7ad5151c4de7df6767ff9575
                                                                          • Instruction ID: c9de0b8c5e4428bcfaea2a8dbaa84390192d17ec79b2dd8a525e4cdb13bd8f11
                                                                          • Opcode Fuzzy Hash: 378e3bfb0e615e7e8741f373bf5242fcf6d5b9bb7ad5151c4de7df6767ff9575
                                                                          • Instruction Fuzzy Hash: A9513571D003499FDB10CFA9C889B9EFBF2BB48304F148529E908EB291E7759945CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 512 5cd05d0-5cd062c 513 5cd062e-5cd0653 512->513 514 5cd0680-5cd0703 CreateFileA 512->514 513->514 517 5cd0655-5cd0657 513->517 521 5cd070c-5cd074a 514->521 522 5cd0705-5cd070b 514->522 518 5cd0659-5cd0663 517->518 519 5cd067a-5cd067d 517->519 523 5cd0665 518->523 524 5cd0667-5cd0676 518->524 519->514 529 5cd074c-5cd0750 521->529 530 5cd075a 521->530 522->521 523->524 524->524 525 5cd0678 524->525 525->519 529->530 531 5cd0752 529->531 532 5cd075b 530->532 531->530 532->532
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 05CD06ED
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2626741169.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5cd0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID: 4Lq
                                                                          • API String ID: 823142352-2237474892
                                                                          • Opcode ID: c3d1a810d29f28dd4533b612898218e472765da959cb299bdbafb5dbe509f711
                                                                          • Instruction ID: d1af95ed59d92b451ba18298a5fb29f7caf06c43d5440bda75a58176e1ee4469
                                                                          • Opcode Fuzzy Hash: c3d1a810d29f28dd4533b612898218e472765da959cb299bdbafb5dbe509f711
                                                                          • Instruction Fuzzy Hash: 1C415670D003499FDB10CFA9C888B9EFBF2BB48300F148529E908EB291E7759945CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 533 5cd2d40-5cd2dcb 539 5cd2dcd-5cd2dda 533->539 540 5cd2ddc-5cd2df4 533->540 539->540 543 5cd2df9-5cd2e28 RegDisablePredefinedCache 539->543 541 5cd2eb6-5cd2ee0 540->541 552 5cd2e6d 541->552 553 5cd2ee2 541->553 545 5cd2e2a-5cd2e30 543->545 546 5cd2e31-5cd2e4c call 5cd2808 543->546 545->546 554 5cd2e51-5cd2e69 546->554 558 5cd2e6f 552->558 559 5cd2e78 552->559 555 5cd2eb4 553->555 556 5cd2ee4-5cd2ef6 553->556 554->552 555->541 558->559 559->541
                                                                          APIs
                                                                          • RegDisablePredefinedCache.ADVAPI32 ref: 05CD2E11
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2626741169.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5cd0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CacheDisablePredefined
                                                                          • String ID: `Qq
                                                                          • API String ID: 1885667121-2318545310
                                                                          • Opcode ID: 3757845eed8ce172922971692991f529f7c0245ea5e487936bc49d2839940963
                                                                          • Instruction ID: 95966f083a22d01fac186df1060eed43f5abe815e1adec328c9777a97a270dd8
                                                                          • Opcode Fuzzy Hash: 3757845eed8ce172922971692991f529f7c0245ea5e487936bc49d2839940963
                                                                          • Instruction Fuzzy Hash: C9313774D002089BDB14DF99D544B9EFBF2AF88311F148829E905AB350DBB56945CFA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 560 57d0698-57d06b2 562 57d06b9-57d164a 560->562 563 57d06b4 560->563 566 57d164c-57d164f 562->566 567 57d1652-57d16b7 CreateNamedPipeW 562->567 563->562 566->567 569 57d16b9-57d16bf 567->569 570 57d16c0-57d16e1 567->570 569->570
                                                                          APIs
                                                                          • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 057D16A4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateNamedPipe
                                                                          • String ID: 4Lq
                                                                          • API String ID: 2489174969-2237474892
                                                                          • Opcode ID: cad5689af10bef448f07d452f6794ab069bf03009123e2b85996cba316cfcc0b
                                                                          • Instruction ID: 3b0b381ef3eac338b7a3d7fbc0c9f0bb029ee52cffd9750b4e2c26d0826a88d9
                                                                          • Opcode Fuzzy Hash: cad5689af10bef448f07d452f6794ab069bf03009123e2b85996cba316cfcc0b
                                                                          • Instruction Fuzzy Hash: 7C315A718053489FDB11CF99D484ACEFFF1BF49314F18805AE958AB262C775A806CB61

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 573 57d06b4-57d164a 577 57d164c-57d164f 573->577 578 57d1652-57d16b7 CreateNamedPipeW 573->578 577->578 580 57d16b9-57d16bf 578->580 581 57d16c0-57d16e1 578->581 580->581
                                                                          APIs
                                                                          • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 057D16A4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateNamedPipe
                                                                          • String ID: 4Lq
                                                                          • API String ID: 2489174969-2237474892
                                                                          • Opcode ID: 657004e53de65d1e9ef3a34ca7433504f631746cf46a45e60103a844e471f8aa
                                                                          • Instruction ID: deab11cef342b1d0d1b1e9363b133ae401d586cc2aaf843df386bd88ae725c16
                                                                          • Opcode Fuzzy Hash: 657004e53de65d1e9ef3a34ca7433504f631746cf46a45e60103a844e471f8aa
                                                                          • Instruction Fuzzy Hash: B73111B5800348DFDB20CF9AD484A8EFBF5BB48310F18C029E919AB221C776A815CF60
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (&q$(q
                                                                          • API String ID: 0-2464455664
                                                                          • Opcode ID: 7de0eb6b8f2139e9690bc2926567e3bcf9b8f20b39bd999cc4d6ae3498d2767d
                                                                          • Instruction ID: 5bccf706db3cfd1fb2e32d43d1bfab175a8f1b8cedb733d9ea1cf5a285c227cf
                                                                          • Opcode Fuzzy Hash: 7de0eb6b8f2139e9690bc2926567e3bcf9b8f20b39bd999cc4d6ae3498d2767d
                                                                          • Instruction Fuzzy Hash: E0818331F002158BEB19DFA9D4506AE7AF2AFC4300F54812DE906FB391DE34AD52CB95
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2624435583.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5290000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7ed9abdfa8c2ce3706cd88f2810e62018fa7a06a2a6ff0d08441652f84ce27c4
                                                                          • Instruction ID: 1562ed6105bab74a30338ae819031cf3a4b47734ea373317b5c75ca90e282607
                                                                          • Opcode Fuzzy Hash: 7ed9abdfa8c2ce3706cd88f2810e62018fa7a06a2a6ff0d08441652f84ce27c4
                                                                          • Instruction Fuzzy Hash: 9C61B035A203059BEF69DF64DA54AAEBBB2FF84314F14842DD506DB380DF74AD068B81
                                                                          APIs
                                                                          • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0529FA1F
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2624435583.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5290000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcessUser
                                                                          • String ID:
                                                                          • API String ID: 2217836671-0
                                                                          • Opcode ID: 769fa56dd3365e134eb97eca131fab256c641d031fb8233d084286d4740315fe
                                                                          • Instruction ID: ebea8d3302b303fb10ccefe959ae85f35752f5f1e1c9b2318d52aec6c66c1168
                                                                          • Opcode Fuzzy Hash: 769fa56dd3365e134eb97eca131fab256c641d031fb8233d084286d4740315fe
                                                                          • Instruction Fuzzy Hash: D841467280034AEFCF11CFA9C980ADEBBF1FF48310F05856AE958A7251D734A955CB90
                                                                          APIs
                                                                          • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0529FA1F
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2624435583.0000000005290000.00000040.00000800.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_5290000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcessUser
                                                                          • String ID:
                                                                          • API String ID: 2217836671-0
                                                                          • Opcode ID: b5683607604700724ffb731b2bb60311d9ee20c96ad9aaf41f17f4536973356d
                                                                          • Instruction ID: f9e37cdc4b07f0b9da5e1201a01557e65238e4c825ec2175518817929ab08fb6
                                                                          • Opcode Fuzzy Hash: b5683607604700724ffb731b2bb60311d9ee20c96ad9aaf41f17f4536973356d
                                                                          • Instruction Fuzzy Hash: 8F41227690020AAFDF11CFA9C884ADEBBF6FF48310F14842AE958A7250D735A955CF90
                                                                          APIs
                                                                          • ConnectNamedPipe.KERNEL32(00000000), ref: 057D20B0
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: ConnectNamedPipe
                                                                          • String ID:
                                                                          • API String ID: 2191148154-0
                                                                          • Opcode ID: eff5ffd5ac46400339067355ee8e2a515511e2a01d6fb08514d4c231d28fd4f9
                                                                          • Instruction ID: bb8c89e88ba369bca23d4a4d8ed2731ede469cdc2e4bfaa41099a407369f47ed
                                                                          • Opcode Fuzzy Hash: eff5ffd5ac46400339067355ee8e2a515511e2a01d6fb08514d4c231d28fd4f9
                                                                          • Instruction Fuzzy Hash: 002125B4D142589FCB24CFAAC584B9EFFF5AF08300F148069E859AB351DB759942CFA1
                                                                          APIs
                                                                          • ConnectNamedPipe.KERNEL32(00000000), ref: 057D20B0
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: ConnectNamedPipe
                                                                          • String ID:
                                                                          • API String ID: 2191148154-0
                                                                          • Opcode ID: a2592e3919f929e20407aeb486f3e1956d9422990a477482577a31a7b623f7f2
                                                                          • Instruction ID: aa46397ab02d5aea39f285c188f6f7a82cdfa18f46b4dfedd1faa9348228259f
                                                                          • Opcode Fuzzy Hash: a2592e3919f929e20407aeb486f3e1956d9422990a477482577a31a7b623f7f2
                                                                          • Instruction Fuzzy Hash: B32115B4D102589FCB24CF9AC585B9EFBF5BF48310F148069E819A7351CB759946CFA0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: d
                                                                          • API String ID: 0-2564639436
                                                                          • Opcode ID: 1ce88148c817267c952bbd07f37adde76833ab338b6462534ca7a6dee034e077
                                                                          • Instruction ID: df0c762c4dcf99728aeeeb8a984675faf6abaa9d7a6b5486f4ecd52293737889
                                                                          • Opcode Fuzzy Hash: 1ce88148c817267c952bbd07f37adde76833ab338b6462534ca7a6dee034e077
                                                                          • Instruction Fuzzy Hash: 56D12975A40605CFCB44DFA8D884A99B7B2FF49314B118699E909AF366DB30FC95CF80
                                                                          APIs
                                                                          • WaitNamedPipeW.KERNEL32(00000000), ref: 057D5DEF
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: NamedPipeWait
                                                                          • String ID:
                                                                          • API String ID: 3146367894-0
                                                                          • Opcode ID: 8e0451a70890f5451ee464ce227d3456616e83bef1411096abe9d9878d3a6b65
                                                                          • Instruction ID: 0ea700659777405a5ec74b2b4e89efe18c2fe8e1ee12feb02c79d05e89a450c0
                                                                          • Opcode Fuzzy Hash: 8e0451a70890f5451ee464ce227d3456616e83bef1411096abe9d9878d3a6b65
                                                                          • Instruction Fuzzy Hash: 3A2137B6C003498FCB20CF9AC444BEEFBF4AB48320F14842ED869A7241C779A545CFA0
                                                                          APIs
                                                                          • WaitNamedPipeW.KERNEL32(00000000), ref: 057D5DEF
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2625808544.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_57d0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: NamedPipeWait
                                                                          • String ID:
                                                                          • API String ID: 3146367894-0
                                                                          • Opcode ID: 97916a48353d93c78223d75af1fbf9f65bfe160d08e9cc2233356dc8a42c6ca8
                                                                          • Instruction ID: 224f92ae87cd22eceb41ebf2c9b5549bae803471c020aafb51892cc50df203a5
                                                                          • Opcode Fuzzy Hash: 97916a48353d93c78223d75af1fbf9f65bfe160d08e9cc2233356dc8a42c6ca8
                                                                          • Instruction Fuzzy Hash: EF21E3B6C003498FDB20CF9AC444AEEFBF5AB48320F14842ED859A7240C779A545CFA1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: c!
                                                                          • API String ID: 0-3867720870
                                                                          • Opcode ID: 58fa8601575d92c7caf155cdcc1af900c9624c94bfa3703c361ba3b2430ced09
                                                                          • Instruction ID: 9a034df5d7d0a49717ff16c7ffe8752655842369862f6098ee0b6c81020c1e6a
                                                                          • Opcode Fuzzy Hash: 58fa8601575d92c7caf155cdcc1af900c9624c94bfa3703c361ba3b2430ced09
                                                                          • Instruction Fuzzy Hash: 6FB16735A00205AFEB55DFA8D88099EBBF2FF84314B548929D405BB354EF34FD068B81
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: V
                                                                          • API String ID: 0-1342839628
                                                                          • Opcode ID: df145db23a6ea155b7444490ce4ebd8273fcbc0e763966904b6838c302768281
                                                                          • Instruction ID: 95cc27a51cb8716dfbc868e0b9f448f427b36a0b95f5ac091569e27aff04425a
                                                                          • Opcode Fuzzy Hash: df145db23a6ea155b7444490ce4ebd8273fcbc0e763966904b6838c302768281
                                                                          • Instruction Fuzzy Hash: 11E0EDB6D01116DFCB84DFAC99411DEFBF0EF48204B60846AC929E7205E2325B139FD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f053927ff76492b6092521505d2105809a48c87ea3588a6d00cdc5650dd51d60
                                                                          • Instruction ID: 9fec40e055cc9d1cfbbf5b96882205dfcc89003e02e8369684a5b3a9f8512bf4
                                                                          • Opcode Fuzzy Hash: f053927ff76492b6092521505d2105809a48c87ea3588a6d00cdc5650dd51d60
                                                                          • Instruction Fuzzy Hash: B7715E35B102068BEB55DBA8C4A066EF7F2EFC9214724852DD805BB355DA70EC438B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 709f36c838bda3c256622cc31f4135f89e720d6825add72eca91645d7f432706
                                                                          • Instruction ID: febfa0ebce14fd836276b75827de4771c40c9c973f5faf97dacfc86dbf6cfa1c
                                                                          • Opcode Fuzzy Hash: 709f36c838bda3c256622cc31f4135f89e720d6825add72eca91645d7f432706
                                                                          • Instruction Fuzzy Hash: 6861B175B002058FDB60EFA8D48069EBBE6FF89314B148469D509EB361DF35ED06CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9a97e3922f578bfdf7d4b9df50362903325f71011d869dcf60fa5837049464ac
                                                                          • Instruction ID: 0fccb303962c0973e9161da98f8388463026edec707454c400712ae2384faa4f
                                                                          • Opcode Fuzzy Hash: 9a97e3922f578bfdf7d4b9df50362903325f71011d869dcf60fa5837049464ac
                                                                          • Instruction Fuzzy Hash: 9451EF34B003129BEB51ABB8D99062E7BD2FBC5344B148529D525AB380EF78FC468792
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 87d7b8853690ff9a006e39f281abde640a3e9d30c544dc0e3d25c7563bae4612
                                                                          • Instruction ID: c71842d29ea9acd0807cb42000c0f033753ec9392f49cd4050fd6553752aa6c8
                                                                          • Opcode Fuzzy Hash: 87d7b8853690ff9a006e39f281abde640a3e9d30c544dc0e3d25c7563bae4612
                                                                          • Instruction Fuzzy Hash: D351F934B00701CFDB64DF69D894A5AB7F2FF892147148A18E496EB764E730F8068B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e4d70e42f33546c21b9ffc002f90e67416e6f124a26bf37b260473a5f78408ea
                                                                          • Instruction ID: 5d8f40fcba680d92f25dd4f5d72d28a2817a2c68224cb43304152867d8f8e34e
                                                                          • Opcode Fuzzy Hash: e4d70e42f33546c21b9ffc002f90e67416e6f124a26bf37b260473a5f78408ea
                                                                          • Instruction Fuzzy Hash: 9541D034B013119FEB52ABB8D89066E7BD2BBC5304B088529D515EF381EF78FC468792
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1a8d5965af2448c675f5ee1992770271833891ca114b64d55bcf53dc234e88b6
                                                                          • Instruction ID: 1bbd394295c08c432f9061333ec739fad1d1197d26faa9648204272e99919b23
                                                                          • Opcode Fuzzy Hash: 1a8d5965af2448c675f5ee1992770271833891ca114b64d55bcf53dc234e88b6
                                                                          • Instruction Fuzzy Hash: 5441E734600701CFD774DF29D494A6AB7F2BF89355B144A1CE496EB6A5D731F806CB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3584d0bbdb5d24d59a3b9a76fbd86f4d40df4b6a822dcb240f98401be4c174fd
                                                                          • Instruction ID: fa17fa56106c1ab0803e99e80c641d007ecde9b43a34ee530c7a2614116b1de9
                                                                          • Opcode Fuzzy Hash: 3584d0bbdb5d24d59a3b9a76fbd86f4d40df4b6a822dcb240f98401be4c174fd
                                                                          • Instruction Fuzzy Hash: 7231C572D052458FEB25DBB0C894BDCBBF1EF4A310F06459AD005BB262DA786D47C751
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 56693269ae3983fbf779db4bfb648b410bdc3a5c26a9495205139f595d576c58
                                                                          • Instruction ID: 9412e23fd7209a57b756e75c77f9e1cf1aced123c09077e05748b44c4be6a746
                                                                          • Opcode Fuzzy Hash: 56693269ae3983fbf779db4bfb648b410bdc3a5c26a9495205139f595d576c58
                                                                          • Instruction Fuzzy Hash: FA412031E10219DBDB14DFA9C990BDEBBF6BF88704F148129E411BB241DB74AD46CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 35d853bfee6ffc1ef872bdbbdc4cb930959ed8a1f185ca28b7a5688b800ea3e5
                                                                          • Instruction ID: a1566c8945a32b3b9520b863aa8978ccbb5a4aed87f533f12a595da2a4aa80cc
                                                                          • Opcode Fuzzy Hash: 35d853bfee6ffc1ef872bdbbdc4cb930959ed8a1f185ca28b7a5688b800ea3e5
                                                                          • Instruction Fuzzy Hash: BF411B34A00701DFD734DF29C884A5AB7F2BF89354B248A5CE486AB795E731F946CB50
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: be9d7509794c79c35328cb1be45a79554fff8f3a90a7c3a0bc86f99c46078690
                                                                          • Instruction ID: daf300302796a62b96542011493b027f8a7b9495f4fccbd97c68c44408f1bc88
                                                                          • Opcode Fuzzy Hash: be9d7509794c79c35328cb1be45a79554fff8f3a90a7c3a0bc86f99c46078690
                                                                          • Instruction Fuzzy Hash: FD313934F012158FEB54DBA8D490A6EF7F6FF89214B10856AD419EB754EB30FD028B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5f83f0d46f99030fc62f915eab6433e2b5bfccb27e66eb57ccf575716fffcf68
                                                                          • Instruction ID: 0d18caa2e3839424dd5c4eb223f89330b47013c264ae1672ed1098ff3dc9a582
                                                                          • Opcode Fuzzy Hash: 5f83f0d46f99030fc62f915eab6433e2b5bfccb27e66eb57ccf575716fffcf68
                                                                          • Instruction Fuzzy Hash: CA31B172E052458FEB25DBA0C894ADDBBF1FF4A310F054599D005BB362DA38AE47CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 025e41df0f6bd64664eece69d4d39dbc15dbbc8d8cd72b6bbeacecc42a4fbb82
                                                                          • Instruction ID: af248589d567c900b8c09f79be3a8340a82c9959bc5ad077d4e079533ceb625a
                                                                          • Opcode Fuzzy Hash: 025e41df0f6bd64664eece69d4d39dbc15dbbc8d8cd72b6bbeacecc42a4fbb82
                                                                          • Instruction Fuzzy Hash: BE31D635A40305AFE725EB64E880A9EBBB2FF80311F008A28D1059F654DB74BD0ACBD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 74219f182e64ab95d5820d1913640ccc8c72064336abb251d17d91f07b35c8a9
                                                                          • Instruction ID: af371476fecbd2bb52268685314150a4779e42dfa8fbb71b485ce9e4be9b0e95
                                                                          • Opcode Fuzzy Hash: 74219f182e64ab95d5820d1913640ccc8c72064336abb251d17d91f07b35c8a9
                                                                          • Instruction Fuzzy Hash: 56411338B002068FDB54DF68D59496EBBF2FF8931071489A8E90A9B365DB34FC45CB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d56c9ef07261971829c22c63e528d361b2a0d04b21ff1c8ccf2f2a297a76e792
                                                                          • Instruction ID: b73798ca83a1b92db81a4b1e8ce9756a9e810b0be61e67bd6ee997501ce494c4
                                                                          • Opcode Fuzzy Hash: d56c9ef07261971829c22c63e528d361b2a0d04b21ff1c8ccf2f2a297a76e792
                                                                          • Instruction Fuzzy Hash: FE312534B002028FDB54DF69D594D2EB7E2FF8831071485A8E90A9B360DB30FC05CB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d4c55be220bb46e814499fafde7ce8d2be4ca14f0fd2550d0efcad8ed11dc5ff
                                                                          • Instruction ID: 4c47778b3ac630e1dbbd6c7fe9ef0d4cac92c520df0b7170cb8116e454c9e745
                                                                          • Opcode Fuzzy Hash: d4c55be220bb46e814499fafde7ce8d2be4ca14f0fd2550d0efcad8ed11dc5ff
                                                                          • Instruction Fuzzy Hash: 4A31F834600701CFC774DF69D89865ABBF2BF84351B104B2CE4A69B6E4DB70B949CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2598159614.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_18ad000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 942df89dfe9c74964b7e84c1e61f58288aa1350104c9bbf40fbfcb31dbb91379
                                                                          • Instruction ID: 4275f78f1252ebb5d42915460ca8a89b04cd5613ac7d43d9bcd6de0b685b44aa
                                                                          • Opcode Fuzzy Hash: 942df89dfe9c74964b7e84c1e61f58288aa1350104c9bbf40fbfcb31dbb91379
                                                                          • Instruction Fuzzy Hash: 1B2178B1504244DFEB05DF94D8C0B16BF61FB88324F60C268E8098B647C336D906CBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: abdb48b391e008c398b25a48331471d05852eeaca663b1a5c9ebea18781091d2
                                                                          • Instruction ID: f85c5d6a8aff10c8dfafe2880c8f96a553dec716c108c61ddcff006f8069c7ab
                                                                          • Opcode Fuzzy Hash: abdb48b391e008c398b25a48331471d05852eeaca663b1a5c9ebea18781091d2
                                                                          • Instruction Fuzzy Hash: D4213931E00219CFEF24DBA4C954AADBBF1BF88311F014569E405BB3A0DB75AD468B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: af4fa1e35b19e55c96cd39df77b969c6be04826a523f68aa15ea2a5baa2a6cbb
                                                                          • Instruction ID: a695e3dfacca4b8fc4065697bdd1d5acd4095fb57a4c68babd17495a289ca9e6
                                                                          • Opcode Fuzzy Hash: af4fa1e35b19e55c96cd39df77b969c6be04826a523f68aa15ea2a5baa2a6cbb
                                                                          • Instruction Fuzzy Hash: 682134B6800249DFDB20CF9AC844ADEBBF5FB48310F148529E918A7251C739A951CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0ebdd673f5da82dc67411b6adb9fc13e048e2ed3bfbbb996c1078709fef67d69
                                                                          • Instruction ID: ecde4fd4bbd63b27bb3d362eafba1473ef7de61c54a7b65ea660fd9990395d61
                                                                          • Opcode Fuzzy Hash: 0ebdd673f5da82dc67411b6adb9fc13e048e2ed3bfbbb996c1078709fef67d69
                                                                          • Instruction Fuzzy Hash: E4213D74A01205AFEF40DBA5D9A46AEBBB1EF88305B108998D506B7345DF34BE068B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: efc297172e96c8a7f6441ad3a7a475a4b24c609ab345bac97a1906ac04efa49f
                                                                          • Instruction ID: 54762954c41ec34f8870305e4f56fe5096637bbb23c738f2155162de1d7e2df6
                                                                          • Opcode Fuzzy Hash: efc297172e96c8a7f6441ad3a7a475a4b24c609ab345bac97a1906ac04efa49f
                                                                          • Instruction Fuzzy Hash: 69114C20B017104BEB249BB88490A9EBBE5EFC6264B04856DD429EB655DB34FC078781
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3348b58960fee5f1aa5830b6f97b9420d722e0fad9587974c504ace7b0950374
                                                                          • Instruction ID: 8de33c24d2c4110fabc5fe1ecd89fbbe72a25faa0ae6fa5034d9ddcb0609dc32
                                                                          • Opcode Fuzzy Hash: 3348b58960fee5f1aa5830b6f97b9420d722e0fad9587974c504ace7b0950374
                                                                          • Instruction Fuzzy Hash: B92125B6C00249DFCB10CF9AC844ADEBBF1FB48310F148529E968A7211C739A556CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 553ceb8cbc4ee2258f0f9cda24847091e7e580e351cd90d3a65173e5f40b5b73
                                                                          • Instruction ID: b299f310a777316dfdfaf652e45e509b0066a5e4ba021fe40d4a821a09dd83b7
                                                                          • Opcode Fuzzy Hash: 553ceb8cbc4ee2258f0f9cda24847091e7e580e351cd90d3a65173e5f40b5b73
                                                                          • Instruction Fuzzy Hash: 50210831D10B0ADACB40EFB9D8405EEF7B4EF99310B10D62AE558B7110FB70A695CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b6cd5e19849c0f52db8d314ea538ccf30d10537906c88942bfd49b960e203934
                                                                          • Instruction ID: bfdbb5918e49a593352e48b7783ae98892c80523ff55af019c6f5d1e41c19c7f
                                                                          • Opcode Fuzzy Hash: b6cd5e19849c0f52db8d314ea538ccf30d10537906c88942bfd49b960e203934
                                                                          • Instruction Fuzzy Hash: 12110C36B041048FEF495FF8942026E3BA3EFC8210750842DE506F73D0DE399D229796
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 98b6236701d268f8952bdf1171391a8cdf7a55ee8f4c79454aee6a0276622888
                                                                          • Instruction ID: de1170b2c96215d97c5c746af9c9610bc1ef65bd34df4159ca5df097ca67df1e
                                                                          • Opcode Fuzzy Hash: 98b6236701d268f8952bdf1171391a8cdf7a55ee8f4c79454aee6a0276622888
                                                                          • Instruction Fuzzy Hash: FD016D7A7511008F8758DA69F49496AB7EAFBC9320314897AEA09CB311CE36EC178B54
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0e66ee8f2252602a7645f9a014b03edc56edc6403248e90d9cec0d75d973e885
                                                                          • Instruction ID: e20978d1463062a19344bc17a160c659134f63ad1c1fdda1252c9b7d2b110d64
                                                                          • Opcode Fuzzy Hash: 0e66ee8f2252602a7645f9a014b03edc56edc6403248e90d9cec0d75d973e885
                                                                          • Instruction Fuzzy Hash: 45214D74E00209AFEF44DBA9D9646AEBBB1FB88301B108898D906B7344DF34BD058F95
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2598159614.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_18ad000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                                          • Instruction ID: bb792c0d482ed987e02f226f04222be2fb5f6f72404d892f07ca216dc04af141
                                                                          • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                                          • Instruction Fuzzy Hash: 97112676504280CFDB06CF54D9C0B16BF72FB88320F24C2A9D8098B657C336D556CBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6c7eab1159f96162229927cb7da40b4e2c82d87a3165e3adad452d0d2a642063
                                                                          • Instruction ID: ecf09a3d1820e408ef2f3f221b0124ccb390545e6c1b6064c2d49c99df33b30d
                                                                          • Opcode Fuzzy Hash: 6c7eab1159f96162229927cb7da40b4e2c82d87a3165e3adad452d0d2a642063
                                                                          • Instruction Fuzzy Hash: 8B11653560D3804FE7178B3498504DD7FB1DE4321430985EBD485DF1A7D9259D0BC792
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 436686494888b42212df590cc9f3ff43c8dd85be0275399fd23779abb9d543ea
                                                                          • Instruction ID: 0ff2e247b90f3f43da8076b7c01fafe42ac0c3e2ecef6a5b98e57420121c02e0
                                                                          • Opcode Fuzzy Hash: 436686494888b42212df590cc9f3ff43c8dd85be0275399fd23779abb9d543ea
                                                                          • Instruction Fuzzy Hash: 1D018C35704612CF9720DF69D08491EB7E6AFCD629314456DE94AEB311CB21FC02CBD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: efa72849004ffe69c6463bae038ca394453feb0601d4fb827b9160ae960533a0
                                                                          • Instruction ID: fe82fb9ec1af8915385ff928c659f35b16e29770b335c5efc69371988c5ea33b
                                                                          • Opcode Fuzzy Hash: efa72849004ffe69c6463bae038ca394453feb0601d4fb827b9160ae960533a0
                                                                          • Instruction Fuzzy Hash: EE0188B6B00106DFDB21CBB8D8405EEB7F5EF84215B00457BD514F7241E731A61587A1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c1c5af4f653805e92f23dae79fea36fad34e9ef57a99ad3862280d0cebe055b4
                                                                          • Instruction ID: 0967db0ffb6135a7bb525bf44be03f8951645afd8d6ef8a800589f13bd4efc05
                                                                          • Opcode Fuzzy Hash: c1c5af4f653805e92f23dae79fea36fad34e9ef57a99ad3862280d0cebe055b4
                                                                          • Instruction Fuzzy Hash: 2301BC3230020267EB14BAA9999056FB6D6EBC66247508929D51AEB344EF31FC0A8792
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c2c297a87d9c317e2856c48207bbf2b271aa05b74bf9dd814ef1d3e1d118d422
                                                                          • Instruction ID: 4d2dead28c49ea0d6e505d536d71df10f0df39fc3e267dcbed40f1b5c22f1c37
                                                                          • Opcode Fuzzy Hash: c2c297a87d9c317e2856c48207bbf2b271aa05b74bf9dd814ef1d3e1d118d422
                                                                          • Instruction Fuzzy Hash: 7701F530A093809FD312DBA9E8A0946BFF5DF82214308889BD244CF212DE14F80BC752
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2598159614.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_18ad000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1a15b660c14364c1aab9a983627f802efe02d92ecbcbe964ae70568e71f30ab8
                                                                          • Instruction ID: 307f7a9e2d8f620650b14f4d13cdd9dcc11df6efb2b7a4bacc8fb1f0f43467b7
                                                                          • Opcode Fuzzy Hash: 1a15b660c14364c1aab9a983627f802efe02d92ecbcbe964ae70568e71f30ab8
                                                                          • Instruction Fuzzy Hash: 2F01696104D3C09FE7124B258894762BFB8EF43224F1981DBE988CF1A3C2695C45CB72
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0ce337b1f252bddddedd5d130e9a74adaabd641d64c155f12ab92969360f6a26
                                                                          • Instruction ID: 148f7ab38c97be277ed900256984c000aaa23f2f40fcb8b4d76231873be4ae41
                                                                          • Opcode Fuzzy Hash: 0ce337b1f252bddddedd5d130e9a74adaabd641d64c155f12ab92969360f6a26
                                                                          • Instruction Fuzzy Hash: 2001B17660C3C08FD7528BA8D8209997FB5DF4B260719C0CFE588DB263C6349802D776
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2598159614.00000000018AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_18ad000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e8fd3652d95ac5facb09f27091bca08d0c0f95a62831a51bc4a4cf8118240934
                                                                          • Instruction ID: 40dc634cff0c4e064e874427a71e4f8cfcc4429ef82b4fda5655eaf216bf01c2
                                                                          • Opcode Fuzzy Hash: e8fd3652d95ac5facb09f27091bca08d0c0f95a62831a51bc4a4cf8118240934
                                                                          • Instruction Fuzzy Hash: ED01F7314443449FF7208A65CC84B66BFD8DF417A5F48C219ED48CF583C6799945CAB1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0b81c37ea7f08ce8e0f794c96aeb17d5efee97c73a13d2cb08a567536626ca12
                                                                          • Instruction ID: 96f660a47425a43024f9610e61d5f7af993aa8aa38700890a0d4b48fb4b8b431
                                                                          • Opcode Fuzzy Hash: 0b81c37ea7f08ce8e0f794c96aeb17d5efee97c73a13d2cb08a567536626ca12
                                                                          • Instruction Fuzzy Hash: DB015AB1D04245CFCB44CFA8C8816EEBFF1EF4A310B1481A9D519EB211E631AA13CB82
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4b1ce65c1e6e8709cb7a615753d1b5206d420fd659af4d8916294d707cac06d6
                                                                          • Instruction ID: 1888c147977945c569d6e2a5703d0f0276239ddb5439bb5e3faeda0704df07d5
                                                                          • Opcode Fuzzy Hash: 4b1ce65c1e6e8709cb7a615753d1b5206d420fd659af4d8916294d707cac06d6
                                                                          • Instruction Fuzzy Hash: 3BF0F6753997804FC756CBB894958C93FF1EE4331034601EAD049CF2A7EA1C9E078751
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2e7e53544c749dca244a017ca504795b11bfc1d1808a197a3cf96a650e2228cf
                                                                          • Instruction ID: 7bc992c1f4959cbc6e9b922d86d73425e6c87c9f7c228d59ce0661068ac29f2f
                                                                          • Opcode Fuzzy Hash: 2e7e53544c749dca244a017ca504795b11bfc1d1808a197a3cf96a650e2228cf
                                                                          • Instruction Fuzzy Hash: AFF0BB377002049FAB055FD898005EF3B67EBC83107008029F505E7250DA3198229BA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 03cba4fdf81130294385b86bba9f7143bfa4f9c20d6f02e13d94e07f753356ec
                                                                          • Instruction ID: 855ea30b1aa940277c80db84bb6af16fdb64eb6f109d9bce5705982cc382416f
                                                                          • Opcode Fuzzy Hash: 03cba4fdf81130294385b86bba9f7143bfa4f9c20d6f02e13d94e07f753356ec
                                                                          • Instruction Fuzzy Hash: FBF0E930B40301E79720AA9AE850A1BBBDADBC4614344842ED609DB300DE64FC068B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7c938fb0e4ddfa64ce7140bf9ffa390c41692b18f45c9b484bd60a43b96c9e01
                                                                          • Instruction ID: 1d61f7140260933de2e94af7138f8ffae97566cdc196becaf2202ab7cd5a308a
                                                                          • Opcode Fuzzy Hash: 7c938fb0e4ddfa64ce7140bf9ffa390c41692b18f45c9b484bd60a43b96c9e01
                                                                          • Instruction Fuzzy Hash: 6BF0F4B18593D7CFDF91DB70D49039D3F70EB02310F004A59C2419A192CB78201BC791
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9d61c08aa259484ef5b7cc3cda227ffbf62f7839ee7a9941195c8edff9a14b66
                                                                          • Instruction ID: ecf68402971a752be04dbe5a08069594730e25a98c68004fb90b996c85c1a65e
                                                                          • Opcode Fuzzy Hash: 9d61c08aa259484ef5b7cc3cda227ffbf62f7839ee7a9941195c8edff9a14b66
                                                                          • Instruction Fuzzy Hash: 05F05E3444A384AFCB52CB78D9506997FF4DF46215F0501DEC5C5DB153EA352E0AC752
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 46106fa8b61dc55dc462e3673caacff46162f625de8dd1cebd4a9fb191eae15f
                                                                          • Instruction ID: 73697eacadd6128a2f9e4b28aaaff43b69b6cc88ac3785f83f49927a850dafec
                                                                          • Opcode Fuzzy Hash: 46106fa8b61dc55dc462e3673caacff46162f625de8dd1cebd4a9fb191eae15f
                                                                          • Instruction Fuzzy Hash: 3BF096B0D4024ADFDF90DFA4E45576E77B4F744325F004A69C701A7254DF7875168B81
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 19ee79e88d1f1197aba179c379803a1143d2b82b93767d000f047f55810f8873
                                                                          • Instruction ID: 7ffa130aa2c564092b36752754ef79b26bf6de9de4f4897c84cea750dee5f8c2
                                                                          • Opcode Fuzzy Hash: 19ee79e88d1f1197aba179c379803a1143d2b82b93767d000f047f55810f8873
                                                                          • Instruction Fuzzy Hash: 39F05E31B00614CFD769DF69C454AAEB7E1EF88350B04C069E819DB354EB39EE11CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0bed9dbfe4e1c25c3832f5bbab19c89718361b1ffa0a53797024c23054bfc71f
                                                                          • Instruction ID: db69e7a63c5e702b49181da82c736100ffc08d16d0ab9f96ae90686dee3c4c7e
                                                                          • Opcode Fuzzy Hash: 0bed9dbfe4e1c25c3832f5bbab19c89718361b1ffa0a53797024c23054bfc71f
                                                                          • Instruction Fuzzy Hash: 87E03076704204EB57549B8AD400D9FBBAEDBC9260714C01AF948D7301D931E9028BA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bdb1e2c91e7b24f30dab9b15826cfc0ae06231a049463ff346eb7a4067e92dae
                                                                          • Instruction ID: 71731f4f29ada94cddd24253bd106c71c85da4a0cee0cce128330386681b0841
                                                                          • Opcode Fuzzy Hash: bdb1e2c91e7b24f30dab9b15826cfc0ae06231a049463ff346eb7a4067e92dae
                                                                          • Instruction Fuzzy Hash: BDF08C36300300CFD3198B28E184A95BFE2EF85725B1584ADD18ADB2A2DB32EC42CB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 99a83080c9b8b4965527abd5129a20fb9b1891a1979a6a06915377fc12bd81bb
                                                                          • Instruction ID: f54e8735b7192c77005a6099d1413354a935cf490461ada103fc5c331419418b
                                                                          • Opcode Fuzzy Hash: 99a83080c9b8b4965527abd5129a20fb9b1891a1979a6a06915377fc12bd81bb
                                                                          • Instruction Fuzzy Hash: 06F07471E00219DF8B44DFADD84169EFBF5EF89210B64C16AD918E7211E731AA12CFD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4b6b010e36278407acfe135c0a3ab0a03e8b79dcb8d7dd66adbcc7a5531b9afd
                                                                          • Instruction ID: f2ea59cf17b5152148b12ef68371fb1ed54c79ede1486f21b9046cee12d7bf46
                                                                          • Opcode Fuzzy Hash: 4b6b010e36278407acfe135c0a3ab0a03e8b79dcb8d7dd66adbcc7a5531b9afd
                                                                          • Instruction Fuzzy Hash: 6FE0DF32B022006BC314D66EE890996B7AAEBD9325B200879E60CCB311CE76DC83C290
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 16aafa7e9ecb1515f6b8d456b91562b5c913344e3bad6c3aee0466d92a19d496
                                                                          • Instruction ID: 7cf7a12c9bf557501969a2af03e290c0db133f6ca55310c8e619cc51af5cfcd7
                                                                          • Opcode Fuzzy Hash: 16aafa7e9ecb1515f6b8d456b91562b5c913344e3bad6c3aee0466d92a19d496
                                                                          • Instruction Fuzzy Hash: AFE03975E55246CF8B50EFB8940459EBFF4EE09650B2495EFD488E7222E2309A088B82
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8be53f0360bafea1318868ac5b846e3a710c4d3c2b4e3e5e245028db876cfb5f
                                                                          • Instruction ID: 3d5b04c4e30cee980aaac3aa2eef828dc293b04aeb4671ebf8e1ad7564aebde4
                                                                          • Opcode Fuzzy Hash: 8be53f0360bafea1318868ac5b846e3a710c4d3c2b4e3e5e245028db876cfb5f
                                                                          • Instruction Fuzzy Hash: AFE0DF34E01108EFCB41DFA4F5801CDBBB0EFC220471046A9C608EB202EA341F1BA791
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bf85420044a4ca222f4cd1eb9c2c240c7c947a7c281de9ab163d9396445133e9
                                                                          • Instruction ID: 67d53eaf917a1ccbf12dbeebea9a70a348c8ddfca41e5a17643f52ff73eb352d
                                                                          • Opcode Fuzzy Hash: bf85420044a4ca222f4cd1eb9c2c240c7c947a7c281de9ab163d9396445133e9
                                                                          • Instruction Fuzzy Hash: 6EE02632B022005BC314956EE850957F79AEBD8321B100839960CC7301CD76DC438290
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 264d5c9bac08c5a5b1aca282e84f2652ac4da54a0eb989dd30740254fba37ab1
                                                                          • Instruction ID: fbb3c4fe91292cd59dba7c527a2b892debc26c2937928c71df7153c546c5d118
                                                                          • Opcode Fuzzy Hash: 264d5c9bac08c5a5b1aca282e84f2652ac4da54a0eb989dd30740254fba37ab1
                                                                          • Instruction Fuzzy Hash: 5FE09231300300CFD3149B1AD144E56BBE6EFC5B25B1584ADE5499B3A1CB71FC41CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fa926553dbea9c7a5430891b9108979a3f16cc4d36da4f487aa00aa9d94c7079
                                                                          • Instruction ID: 9f931fe0cbba89366f062dcc9d7fe08ec9ed0ce9d7d69423ae922fb0aae39edf
                                                                          • Opcode Fuzzy Hash: fa926553dbea9c7a5430891b9108979a3f16cc4d36da4f487aa00aa9d94c7079
                                                                          • Instruction Fuzzy Hash: 08E0B671E00229DF8B80EFADD9015AEFBF4EF48210B50846AD91CE7201E3729B128FC1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d5e775c8e00f6eb46b9c2d57083e23d440ba1747b278a64fb55b04c7aa48ca53
                                                                          • Instruction ID: d1ba0681a6e5d1d0ab501affe7d357155732eb5e1d61be801d1a45652913f1e6
                                                                          • Opcode Fuzzy Hash: d5e775c8e00f6eb46b9c2d57083e23d440ba1747b278a64fb55b04c7aa48ca53
                                                                          • Instruction Fuzzy Hash: 04D05E347602145FC784E77CD444A6A37DAAF887313514164D50DCB324DE65EC0147D0
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2e87032894c95c4208e9c90bccaa23883f837c5db2c74df4f05e8492571fc8c2
                                                                          • Instruction ID: 43856c2b7c636e5502017668fdabf6c4e671e1f9de96a76cbf2f6880c7ae05d8
                                                                          • Opcode Fuzzy Hash: 2e87032894c95c4208e9c90bccaa23883f837c5db2c74df4f05e8492571fc8c2
                                                                          • Instruction Fuzzy Hash: FED05E30E4120CFFDF40DFE8E90555DBBB9EB85204B1085ADD908E7300EA316F169B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 96a497ad7eeb9e9cb484e3baf341a2277fa3668ffa9c51cd09523cac8ea3a0c0
                                                                          • Instruction ID: 3a2d8f5ba31d250f175824c60864ff0096ee214a8e8cadbbbfb3574adf8aafeb
                                                                          • Opcode Fuzzy Hash: 96a497ad7eeb9e9cb484e3baf341a2277fa3668ffa9c51cd09523cac8ea3a0c0
                                                                          • Instruction Fuzzy Hash: 88E012728107089FC705BF64D485699BBB4EFD1300F01C64AD64A5A165FB709281DB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1c5def9cbd040e6579d209616328c2dc2d8732b6ee75dac82c4f31a328ac29f5
                                                                          • Instruction ID: 43729766566104afa505d9850a95d1e7bdaa57a8c3d92b8a16593f0002b9f013
                                                                          • Opcode Fuzzy Hash: 1c5def9cbd040e6579d209616328c2dc2d8732b6ee75dac82c4f31a328ac29f5
                                                                          • Instruction Fuzzy Hash: 5FD01734A40208FF9B40EFA8E94159DB7F9EB44204F1046A8D949E7200EA316F059BD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bf4207b1aca39a2eff2b5972bc830234ed803f0a52dc5b06ceaaeeeb0b6f21c7
                                                                          • Instruction ID: 52eb35daa68f2fb24ad5de1cd1c9b891ab53356ca211f7c437c511139bcc56c6
                                                                          • Opcode Fuzzy Hash: bf4207b1aca39a2eff2b5972bc830234ed803f0a52dc5b06ceaaeeeb0b6f21c7
                                                                          • Instruction Fuzzy Hash: DDD0C73141470D89C700BB78D454469F778EED5200F00C75AE48957111FF70D6D0D681
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2616959009.00000000040C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_40c0000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 63e45f9d1385c7beba70fa6c0c2050fc55e80293700cf346667981cdff37d6f0
                                                                          • Instruction ID: adf6537e99bbb44b3e6196f3d6133b3e344c07cd5926fdf2fc2ac825c783c6c8
                                                                          • Opcode Fuzzy Hash: 63e45f9d1385c7beba70fa6c0c2050fc55e80293700cf346667981cdff37d6f0
                                                                          • Instruction Fuzzy Hash: 86C04C4A00D7E36FDF43423848A05527F7158931457DE00C6D4C1AB453D6489926C372

                                                                          Execution Graph

                                                                          Execution Coverage:10.1%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:5
                                                                          Total number of Limit Nodes:1
                                                                          execution_graph 19039 7ffaab558014 19041 7ffaab55801d 19039->19041 19040 7ffaab558082 19041->19040 19042 7ffaab5580f6 SetProcessMitigationPolicy 19041->19042 19043 7ffaab558152 19042->19043

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 95 7ffaab86000c-7ffaab860141 111 7ffaab860186-7ffaab8601d0 95->111 112 7ffaab860143-7ffaab860185 95->112 123 7ffaab860212-7ffaab860228 111->123 124 7ffaab8601d2-7ffaab8601f0 111->124 112->111 128 7ffaab8651d0-7ffaab8651e6 123->128 134 7ffaab860233-7ffaab860282 124->134 135 7ffaab8601f2-7ffaab860211 124->135 129 7ffaab8651e9-7ffaab865217 128->129 132 7ffaab86521a-7ffaab865246 129->132 136 7ffaab865271-7ffaab8652a4 132->136 137 7ffaab865248-7ffaab865269 132->137 169 7ffaab8602d1-7ffaab8602f4 134->169 170 7ffaab860284-7ffaab86028b 134->170 135->123 138 7ffaab8652aa-7ffaab8652b9 136->138 139 7ffaab8653e4-7ffaab865413 136->139 137->136 144 7ffaab8652c4-7ffaab8652c6 138->144 142 7ffaab865415-7ffaab86541f call 7ffaab8646a8 139->142 143 7ffaab865464-7ffaab865478 139->143 142->143 155 7ffaab865421-7ffaab865433 142->155 147 7ffaab86547a-7ffaab865484 143->147 148 7ffaab8654a8-7ffaab8654b3 143->148 144->139 149 7ffaab8652cc-7ffaab865386 144->149 147->148 153 7ffaab865486-7ffaab865497 147->153 149->139 188 7ffaab865388-7ffaab865398 149->188 153->148 160 7ffaab865499-7ffaab8654a1 153->160 155->143 159 7ffaab865435-7ffaab86545f call 7ffaab864938 155->159 159->143 160->148 175 7ffaab8602fd 169->175 176 7ffaab8602f6-7ffaab8602fc 169->176 170->169 179 7ffaab8602ff-7ffaab860318 175->179 180 7ffaab86031a-7ffaab860334 175->180 176->175 179->180 186 7ffaab86033d-7ffaab860352 180->186 187 7ffaab860336-7ffaab86033c 180->187 191 7ffaab86035d 186->191 192 7ffaab860356-7ffaab86035c 186->192 187->186 188->139 193 7ffaab86539a-7ffaab8653df call 7ffaab864928 188->193 195 7ffaab86035f-7ffaab860376 191->195 196 7ffaab86037a-7ffaab8603d9 191->196 192->191 193->139 195->196 209 7ffaab86041b-7ffaab860441 196->209 210 7ffaab8603db-7ffaab860412 196->210 217 7ffaab860483-7ffaab86048e 209->217 218 7ffaab860443-7ffaab860482 209->218 210->209 220 7ffaab860490-7ffaab8604c6 217->220 221 7ffaab8604d8-7ffaab860500 217->221 218->217 228 7ffaab860502-7ffaab860521 221->228 229 7ffaab860524-7ffaab86053c 221->229 228->229 235 7ffaab86053e-7ffaab86055d 229->235 236 7ffaab860560-7ffaab86057e 229->236 235->236 239 7ffaab860580-7ffaab860590 236->239 240 7ffaab86059a 236->240 243 7ffaab860597-7ffaab860598 239->243 242 7ffaab86059f-7ffaab8605a5 240->242 244 7ffaab86063e-7ffaab860641 242->244 245 7ffaab8605ab-7ffaab8605b4 242->245 243->240 248 7ffaab860698-7ffaab8606b6 244->248 249 7ffaab860643-7ffaab86064d 244->249 246 7ffaab8605cd-7ffaab8605d8 245->246 247 7ffaab8605b6-7ffaab8605c3 245->247 251 7ffaab8605da-7ffaab8605f7 246->251 252 7ffaab860624-7ffaab86063c 246->252 247->246 255 7ffaab8605c5-7ffaab8605cb 247->255 266 7ffaab860800-7ffaab86081e 248->266 267 7ffaab8606ba-7ffaab8606c6 248->267 256 7ffaab860655-7ffaab86066e 249->256 258 7ffaab8605fd-7ffaab860622 251->258 259 7ffaab8608e2-7ffaab860921 251->259 252->244 255->246 268 7ffaab8606df-7ffaab8606ea 256->268 269 7ffaab860670-7ffaab860672 256->269 258->252 280 7ffaab860923-7ffaab860931 259->280 299 7ffaab8608bd-7ffaab8608df 266->299 300 7ffaab860824-7ffaab86082e 266->300 275 7ffaab8606cc-7ffaab8606da call 7ffaab860078 267->275 276 7ffaab8606c8-7ffaab8606ca 267->276 273 7ffaab8606eb-7ffaab8606ec 268->273 270 7ffaab8606ee-7ffaab8606fa 269->270 271 7ffaab860674 269->271 278 7ffaab860700-7ffaab860701 270->278 279 7ffaab8606fc-7ffaab8606fe 270->279 271->267 277 7ffaab860676-7ffaab86067a 271->277 273->270 282 7ffaab8606dd-7ffaab8606de 275->282 276->282 277->273 284 7ffaab86067c-7ffaab860681 277->284 287 7ffaab860702-7ffaab86070e call 7ffaab860078 278->287 286 7ffaab860711-7ffaab860715 279->286 292 7ffaab860938-7ffaab86093f 280->292 282->268 284->287 289 7ffaab860683-7ffaab86068e 284->289 291 7ffaab860716-7ffaab86072e 286->291 287->286 294 7ffaab8606ff 289->294 295 7ffaab860690-7ffaab860695 289->295 311 7ffaab860730-7ffaab860732 291->311 312 7ffaab860734-7ffaab860742 call 7ffaab860078 291->312 297 7ffaab860941-7ffaab86094a 292->297 298 7ffaab86094b-7ffaab860952 292->298 294->278 295->291 305 7ffaab860697 295->305 301 7ffaab86095e-7ffaab860969 298->301 302 7ffaab860954-7ffaab86095d 298->302 299->259 303 7ffaab860830-7ffaab860832 300->303 304 7ffaab860834-7ffaab860842 call 7ffaab860078 300->304 301->128 308 7ffaab860845-7ffaab860862 303->308 304->308 305->248 319 7ffaab860868-7ffaab860876 call 7ffaab860078 308->319 320 7ffaab860864-7ffaab860866 308->320 313 7ffaab860745-7ffaab860762 311->313 312->313 321 7ffaab860768-7ffaab860776 call 7ffaab860078 313->321 322 7ffaab860764-7ffaab860766 313->322 323 7ffaab860879-7ffaab860896 319->323 320->323 325 7ffaab860779-7ffaab86078f 321->325 322->325 331 7ffaab86089c-7ffaab8608aa call 7ffaab860078 323->331 332 7ffaab860898-7ffaab86089a 323->332 334 7ffaab860791-7ffaab8607a4 call 7ffaab860078 325->334 335 7ffaab8607a6-7ffaab8607ad 325->335 336 7ffaab8608ad-7ffaab8608b6 331->336 332->336 334->335 341 7ffaab8607cd-7ffaab8607d0 334->341 339 7ffaab8607b4-7ffaab8607c7 335->339 336->299 339->341 342 7ffaab8607e7-7ffaab8607fa 341->342 343 7ffaab8607d2-7ffaab8607e5 call 7ffaab860078 341->343 342->266 343->266 343->342
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 6A
                                                                          • API String ID: 0-4271988922
                                                                          • Opcode ID: f854efcba224c886957c5b017ab22017b9eea3bee8cbb0a10381dc5cd0057a60
                                                                          • Instruction ID: e9b12714f84c35241474d83ed8ce050dcfd9c4382ab37e305ddf485dd81e7b4c
                                                                          • Opcode Fuzzy Hash: f854efcba224c886957c5b017ab22017b9eea3bee8cbb0a10381dc5cd0057a60
                                                                          • Instruction Fuzzy Hash: 94920671A0D74A8FE799EB2CC4A16A47BE0EF5A344F1445FAD04DCB1A3DD24F80A8785
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7828c89e2b3fdbab9d51bef35113dc441859bdae4d0b544300c5c885f67816c9
                                                                          • Instruction ID: 43476a294a91a92fb06e7e4f9006a00bd8b9b216e2f8a42fc35e05ae68f48582
                                                                          • Opcode Fuzzy Hash: 7828c89e2b3fdbab9d51bef35113dc441859bdae4d0b544300c5c885f67816c9
                                                                          • Instruction Fuzzy Hash: E5036D30A19619CFDBA8DB28C8957A8B7F1EF59340F5081F9D40DD72A2DE35AD85CB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 844cbe8ae0052f007cb6d92d0b3f5d41e65d2923c0a29dcf4714c2bcba376bb2
                                                                          • Instruction ID: ee7613adce16059de23f837ef8990804b5caf945ebce2f9e6aa98288ad339e42
                                                                          • Opcode Fuzzy Hash: 844cbe8ae0052f007cb6d92d0b3f5d41e65d2923c0a29dcf4714c2bcba376bb2
                                                                          • Instruction Fuzzy Hash: CA320535A1EA468FE795A73C84656B9B7D2EF5A384F1480FAC44EC71E3DD18780A83C1

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2623537074.00007FFAAB550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab550000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID: MitigationPolicyProcess
                                                                          • String ID:
                                                                          • API String ID: 1088084561-0
                                                                          • Opcode ID: c1b94585467752eeb8cf5377efa794422f2639623fdd656e626f3c7a77e13b32
                                                                          • Instruction ID: 438b47ee7fe6d05aff39d8b15a558b847013ecf8cb80f913eeebe672c0ccf527
                                                                          • Opcode Fuzzy Hash: c1b94585467752eeb8cf5377efa794422f2639623fdd656e626f3c7a77e13b32
                                                                          • Instruction Fuzzy Hash: DC515B3190C7498FDB19DFA8C84A5E97FE0EF56351F04427EE04AC31A3DE68A44A8BD1

                                                                          Control-flow Graph

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 6A
                                                                          • API String ID: 0-4271988922
                                                                          • Opcode ID: 157f1acbe65167ccd6b044c290fd1aa512701ed8cf61b109a8d20c6c8139178e
                                                                          • Instruction ID: fbe3b6992f0830277e037f99edcfddc9178a31607a3fc3ba51641f9ea4352798
                                                                          • Opcode Fuzzy Hash: 157f1acbe65167ccd6b044c290fd1aa512701ed8cf61b109a8d20c6c8139178e
                                                                          • Instruction Fuzzy Hash: 3AC12661A1DA4A8FEB95DB2CC8657747BD2EF9E340F1440F9D00DC72E6DE29AC068781

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1187 7ffaab861317-7ffaab861349 1192 7ffaab86134b-7ffaab861378 1187->1192 1193 7ffaab86137c-7ffaab8613c0 1187->1193 1204 7ffaab8613f6-7ffaab861429 1192->1204 1205 7ffaab86137a 1192->1205 1203 7ffaab863aa0-7ffaab863ab8 1193->1203 1193->1204 1206 7ffaab863abd-7ffaab863ac4 1203->1206 1209 7ffaab86142c-7ffaab861432 1204->1209 1210 7ffaab861433 1204->1210 1205->1193 1212 7ffaab861437-7ffaab8614a5 1209->1212 1210->1212 1222 7ffaab8614ef-7ffaab861503 1212->1222 1223 7ffaab8614a7-7ffaab8614ed 1212->1223 1223->1222
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 6A
                                                                          • API String ID: 0-4271988922
                                                                          • Opcode ID: 53ce9bf2128be152631f86b2342b2150794e9498a0a64e906a8fc8018b2722ef
                                                                          • Instruction ID: cc4292bec911e4ef43bc14577819c2f727187f58988dd0c81e23a5e0918f5426
                                                                          • Opcode Fuzzy Hash: 53ce9bf2128be152631f86b2342b2150794e9498a0a64e906a8fc8018b2722ef
                                                                          • Instruction Fuzzy Hash: 6861C6B280E7869FE351AB7CD4A15E5BFA1EF0B354F0846F6D08D8B0A3D919780987D1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: U
                                                                          • API String ID: 0-3372436214
                                                                          • Opcode ID: dc29b85ab44f8b875d4d0f9cc6025320d9c307aea097b320ad0c322a45ba8cc0
                                                                          • Instruction ID: eaa99959f0eedd07ca212e0b177845a4c973f0952604ffe758a611f286784bc8
                                                                          • Opcode Fuzzy Hash: dc29b85ab44f8b875d4d0f9cc6025320d9c307aea097b320ad0c322a45ba8cc0
                                                                          • Instruction Fuzzy Hash: 11F06D314097999FCB42EB34D4548D6BFB0EF16310B0541DBE04DCB062E7219A99CBC2
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6659099af6f6fdacc199d68299040563b68103f2b3c74505ad33ec676ac99cef
                                                                          • Instruction ID: 0d62b7bef67afc006028bd7e07598f93bad88e4468112e663745a6f42b080e86
                                                                          • Opcode Fuzzy Hash: 6659099af6f6fdacc199d68299040563b68103f2b3c74505ad33ec676ac99cef
                                                                          • Instruction Fuzzy Hash: A0028C62A0DA8B8BE795A72CD4616F47BD1EF4A394F1881F9D44DC71E3DD18B80A83C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6b35047183c086bcb277a8d8b23a2cc57224167c3022f687695996fd03968e6a
                                                                          • Instruction ID: 1154d6b5e1f29b044759c452b88aa2fcb03e082e695bbcc1bd780bcf362b78ac
                                                                          • Opcode Fuzzy Hash: 6b35047183c086bcb277a8d8b23a2cc57224167c3022f687695996fd03968e6a
                                                                          • Instruction Fuzzy Hash: 8DF13E7560D7098FDB88EF2CD0A0AA177A1FF5A348B2445F9D05ECB1A7CA25F846C744
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bd4c91d1b45ef13a2bee7b7c8037b87253004d5fb8b5b572016a7957cd7c3ba2
                                                                          • Instruction ID: 41934f3fb54be944deb658f5bc2fe6c851c935c447183b71a93dc74245e6f8e9
                                                                          • Opcode Fuzzy Hash: bd4c91d1b45ef13a2bee7b7c8037b87253004d5fb8b5b572016a7957cd7c3ba2
                                                                          • Instruction Fuzzy Hash: C2F14F7460D70A8FDB88EF2CC0A1AA177A1FF5A344B2449F9D05ECB197CA25F846C744
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a9e9c533738bd61548425d2a3a2bb8b5cae1d2825f575cd79594a183f009e0e4
                                                                          • Instruction ID: 011c90547e8b2ed910f8c46f37090ef163a02b03aa16e1b5b55fb9c35039b5e1
                                                                          • Opcode Fuzzy Hash: a9e9c533738bd61548425d2a3a2bb8b5cae1d2825f575cd79594a183f009e0e4
                                                                          • Instruction Fuzzy Hash: 8DB191E7A0D2966BE301B7BCF4A15E97F548F4B2A9B0845F3D08D890B3DD18348A86D5
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: da2eba2af5350ac6f32cb8b3d04da6cfac42e1bbefe84c08aac1e28d3bf85c83
                                                                          • Instruction ID: b66dfbf742e8c2f6d7f876daa7c386f21b6666e3c8b30b4d06cce694b1ca947b
                                                                          • Opcode Fuzzy Hash: da2eba2af5350ac6f32cb8b3d04da6cfac42e1bbefe84c08aac1e28d3bf85c83
                                                                          • Instruction Fuzzy Hash: C6B193E7A0D2A65BE301B77CF4A15E97F54CF4A2A9B0845F3D0CC890B3DD18748A46D5
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 23071bb213d288eb9d8a550ce0841700b5317476b3e4cfbd4ab7c4d5aebe7b0b
                                                                          • Instruction ID: 09fbc9a8edc350fddb137fb01fdf1537c8c3c813c11220ea4fe5e33ffd997e5c
                                                                          • Opcode Fuzzy Hash: 23071bb213d288eb9d8a550ce0841700b5317476b3e4cfbd4ab7c4d5aebe7b0b
                                                                          • Instruction Fuzzy Hash: A0B1A134609B098FDADCEF1CC0A1AA1B3E1FF59744B6549EDD05ACB297CA25F846CB40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a6a09ed8bc8679f311e7a24b548504d81532bbe26b86b1a694c2fe45a795e232
                                                                          • Instruction ID: bfbf8a2a7c3e490728bc14450489af504fb6dcb6d22a306bf92ec3ed942a9a3e
                                                                          • Opcode Fuzzy Hash: a6a09ed8bc8679f311e7a24b548504d81532bbe26b86b1a694c2fe45a795e232
                                                                          • Instruction Fuzzy Hash: 29914B3291EA4E8FDB69DB2CC4614F5B7A1EF5A390F0441FAC44EC75A2ED15B84A87C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9820779e323f5af221fdfe46ccf4ec0165eb6f190fd1afdc941746e3b05709da
                                                                          • Instruction ID: c9f3e2d2c4b5226b96d2b9c8297c766b9ca7e29e047cbffd43b298b39458f942
                                                                          • Opcode Fuzzy Hash: 9820779e323f5af221fdfe46ccf4ec0165eb6f190fd1afdc941746e3b05709da
                                                                          • Instruction Fuzzy Hash: 23A1A23460DB868FDBDDDB2CC0A06A5BBA1FF5A344B2445F9C05DCB59BCA25E846C780
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cc00814dffa15bce1bb44b09d4c45f897181ed62bbcb8838206b038fc66eb416
                                                                          • Instruction ID: df9f5ee6ecc5118cf038c500ca6c395890bb7463c01f44897f6817c443aa1ea8
                                                                          • Opcode Fuzzy Hash: cc00814dffa15bce1bb44b09d4c45f897181ed62bbcb8838206b038fc66eb416
                                                                          • Instruction Fuzzy Hash: 7991D5A3A0D696ABE301A77CE4B15E57F94DF4B3A9B0845F3D18C8A0B3ED14348A46C5
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f171378ebe751651403015b216169af555c622aee68e692f31ed7a80d20f3ba2
                                                                          • Instruction ID: 3f94bfebeda87b240e7a8ac9514e30e01b60ef8e484f8e43f0314aecf8726b6a
                                                                          • Opcode Fuzzy Hash: f171378ebe751651403015b216169af555c622aee68e692f31ed7a80d20f3ba2
                                                                          • Instruction Fuzzy Hash: 83618F71B18A0A8FEB94EB6CC466BB8B7D2EF59340F5445F9D00DC32A7CD28AC458781
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a06cb07e21023c4f0efb829f77e8c9363b72430861a356173a740c155f360cbb
                                                                          • Instruction ID: a112c09ff5aaba367271e0803165362466d699599cd8b235facd87322cc5d01c
                                                                          • Opcode Fuzzy Hash: a06cb07e21023c4f0efb829f77e8c9363b72430861a356173a740c155f360cbb
                                                                          • Instruction Fuzzy Hash: 17514792A0D6CA5FE706777CE4616E87F959F0B368F1C45F6D08CCA0E3CD18680A8391
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a8bfd48f131abd70a1b17791796122636cccad3653c738cbb45cbcbf43b17495
                                                                          • Instruction ID: 9682c4881fafb215f794d972e8b746726df1c0e458cbbe8a144d806b6b50927a
                                                                          • Opcode Fuzzy Hash: a8bfd48f131abd70a1b17791796122636cccad3653c738cbb45cbcbf43b17495
                                                                          • Instruction Fuzzy Hash: A951C57161DA498FEB98DF28C861AA5B7E1FF59350F0440F8D44DCB296DA25F849C7C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: da657070297f0d8d97e0717bbc58b31bbac2c7a845fee32e43374288a14a9346
                                                                          • Instruction ID: 9c2a739bf8c58e9bf866b5e878e28cc86b30d0635bb96b30399b127a038467aa
                                                                          • Opcode Fuzzy Hash: da657070297f0d8d97e0717bbc58b31bbac2c7a845fee32e43374288a14a9346
                                                                          • Instruction Fuzzy Hash: 92417982B1DA4A8FEB84D73D88A55B97BD2EF9E190F5480F9D00DC3297DD04BC4A46D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 06534e1e2d4b2bb4e4ea4d5b4d47fbdba31f7e5e78cd7c3bcda23a5d9b47be3a
                                                                          • Instruction ID: 5d09860a7f6e086434bf635f8055e7861d309fe858de96c9013c1c02b8e800d3
                                                                          • Opcode Fuzzy Hash: 06534e1e2d4b2bb4e4ea4d5b4d47fbdba31f7e5e78cd7c3bcda23a5d9b47be3a
                                                                          • Instruction Fuzzy Hash: DB5126A192DE8A8BEB59AF6CD0516F47B91EF55380F0484FDD40E8B097DD29B84A83C4
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 950de130f733ee8d1528e2c94c6a9ba4ce894ff76e7a2142ddab0e36af36469a
                                                                          • Instruction ID: 98d0454f82d62cfe4c29527ecbecc60ffd44aef2d289095cf659289397adcafe
                                                                          • Opcode Fuzzy Hash: 950de130f733ee8d1528e2c94c6a9ba4ce894ff76e7a2142ddab0e36af36469a
                                                                          • Instruction Fuzzy Hash: 19413682B1DA4B4FE785EB3D88655B8BB92EB5D680F5480F9D00DC32D7DC08B84642C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: be11a5c37f248c2722bc22a7e29f758a64a1d70901e195ca7e10ebdc3eb38d35
                                                                          • Instruction ID: 3aa22d1df428de0cbe45fe22dd5181f79429b2f9ef24764a99b22450f593cb0b
                                                                          • Opcode Fuzzy Hash: be11a5c37f248c2722bc22a7e29f758a64a1d70901e195ca7e10ebdc3eb38d35
                                                                          • Instruction Fuzzy Hash: B1412881B29E4B8FEB84EB2D88956B97BD2EB5D680F5480B4D00DC32D7DD14FC4646D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c25220dbe93228309a037b70693c9e32850238bcaa764ea8097c91a216467857
                                                                          • Instruction ID: 3876cb97c4d6173c43c6de6310b579bfb96143a02b4a40b99cadd021807dd3ea
                                                                          • Opcode Fuzzy Hash: c25220dbe93228309a037b70693c9e32850238bcaa764ea8097c91a216467857
                                                                          • Instruction Fuzzy Hash: 90419470618A898FDB98CF28C8A4AA53BA1FF59314B1441EDD41EC73D2CB31E856CB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c627fccb053448e51977adee9f83e832c061fd06f4a6b374a0771d055777d5ce
                                                                          • Instruction ID: f5640982a86bf44ad268a22bdcd5567bda59bbeb5e3d2c5672ea8a4c923be2ce
                                                                          • Opcode Fuzzy Hash: c627fccb053448e51977adee9f83e832c061fd06f4a6b374a0771d055777d5ce
                                                                          • Instruction Fuzzy Hash: F441E671A1DB8A8FEB95DB2C88646747B91EF5E340F5440F9D04CC71E2CE25A845C782
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 32d99df644a157caf55d1e291bfbdee149c280e07acf4e2798decd1f089aa299
                                                                          • Instruction ID: a83b253aaa62aa37cb9612986999f2256cac841c22ab9184d67f327934173ad5
                                                                          • Opcode Fuzzy Hash: 32d99df644a157caf55d1e291bfbdee149c280e07acf4e2798decd1f089aa299
                                                                          • Instruction Fuzzy Hash: 4A311B51A1AE898FE798E62C44A56B8A7D2EB6E790F0841FAD00DC71D7ED05BC0A4391
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7a7a2529880687a425a93cb21309602b8b82ee612f7858670797e156fc744975
                                                                          • Instruction ID: 303bdc66c428a9af49c4947a043803cb302b10e821376f53050de07d0e23c94e
                                                                          • Opcode Fuzzy Hash: 7a7a2529880687a425a93cb21309602b8b82ee612f7858670797e156fc744975
                                                                          • Instruction Fuzzy Hash: 70314761A19E0A8FE784EF3C98656B8B7D1EF99350F0445BAC40DC72A2DD25FC8687C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ee9369473f222125fff254c6e8dd0c99ba1461d745f70175faff553056c0e616
                                                                          • Instruction ID: f90d3cb222af3b5b0c3ded7b874fde46d14fad307e40f6502071a3f9daebf592
                                                                          • Opcode Fuzzy Hash: ee9369473f222125fff254c6e8dd0c99ba1461d745f70175faff553056c0e616
                                                                          • Instruction Fuzzy Hash: B231DD51A1EF878FEF85872C98659B17FD1EF46250B0882FAD04DCB0A7DD04B84687C2
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d284a31ea40ce04421d1b22de3a186dd00c9985865e46d5b1d9ef1e60474d1c4
                                                                          • Instruction ID: 9ed838670eace8e9125bc5ccb0bd929341cfc553903dfb909125be33f2031ea2
                                                                          • Opcode Fuzzy Hash: d284a31ea40ce04421d1b22de3a186dd00c9985865e46d5b1d9ef1e60474d1c4
                                                                          • Instruction Fuzzy Hash: 9631C8A390D656AFE300A77CE4E15E97FB4DF4B269B0841F3D08D891B3ED14244A46C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 79b1254f9393734077e20b6eea1cec1af9165c087ebdfc223bc2e473b2b85f33
                                                                          • Instruction ID: 338b71abd42c5a456a95af520b43b641171b3f2bf3751276a05e6b2ab88c3d94
                                                                          • Opcode Fuzzy Hash: 79b1254f9393734077e20b6eea1cec1af9165c087ebdfc223bc2e473b2b85f33
                                                                          • Instruction Fuzzy Hash: A9212862A1EB8B5EEB5657AC58B11F46FA1EF5B150F0880F6C08CCB1E7DC1CA84983D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 41594ff4638e0fcaf06bc126470a3dbd8d2625e9e600c4bc5fe4fc07fc7dca23
                                                                          • Instruction ID: eaf983d11fcfbc55db2b79653db8bcf2d39179bc5dcef8df9f4bac7c4583c6dc
                                                                          • Opcode Fuzzy Hash: 41594ff4638e0fcaf06bc126470a3dbd8d2625e9e600c4bc5fe4fc07fc7dca23
                                                                          • Instruction Fuzzy Hash: 6F21263261CF0A4AAE48EB1CE4939F9B3D1EF06260F40417AD44EC75A7DD15F84A87C5
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d727fa0cd53e66a65d583a9d27d2d5f73f2e65a3bf07831da72cb9a19ab9c190
                                                                          • Instruction ID: 33e2e0d6d85a5f3d8fb356ad5195e9db9087a4abdb252c2c68d61d101af86a64
                                                                          • Opcode Fuzzy Hash: d727fa0cd53e66a65d583a9d27d2d5f73f2e65a3bf07831da72cb9a19ab9c190
                                                                          • Instruction Fuzzy Hash: 6A21F462A1EB8B5EEB9657AC58B11F46FA1EF5B150B0880F6C04CCB1E7DC18A84983D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b91e555264777208bfec1950a70a5eee371d594ecd57f0c98fd14df4a9d82f7a
                                                                          • Instruction ID: 75c001b878d7bc3bdcab413fc6ab75a2c387232f4b918be7a9eee4608f6730d3
                                                                          • Opcode Fuzzy Hash: b91e555264777208bfec1950a70a5eee371d594ecd57f0c98fd14df4a9d82f7a
                                                                          • Instruction Fuzzy Hash: 79218220E0E646CFE796972C4470679AA92AF4A380F5484F6D44DC71F3CE28B80D83D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cdfd8966352fed8c650bc9d4a04a01e3c9aebe8485945f09117bc858e117e827
                                                                          • Instruction ID: f2b0b338ee7d23dd2937dd6cd827b264d24f63dd9832c63c4ed90d6f917076af
                                                                          • Opcode Fuzzy Hash: cdfd8966352fed8c650bc9d4a04a01e3c9aebe8485945f09117bc858e117e827
                                                                          • Instruction Fuzzy Hash: B631E231D096068BF798AB2884663B576D1DB4A384F4484BAC04DE33F6DD2C784E47D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8a7a1e4de4ea89bbca69ae0a3de0ed929ae3f875d136487b57dcb8448c9269a5
                                                                          • Instruction ID: edee51cf4e1f787023928884ba85ea046fe93243624b300079a048e965b8d6ad
                                                                          • Opcode Fuzzy Hash: 8a7a1e4de4ea89bbca69ae0a3de0ed929ae3f875d136487b57dcb8448c9269a5
                                                                          • Instruction Fuzzy Hash: 3C212362A1EB8B5EEB86577C48B11F46FA1EF5B240B0880F6C04CCB1E7DC18A84983D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cefd1784a89c3342f3d1d784557b734f079f755395909c775a88f3262a2f82e0
                                                                          • Instruction ID: 1f8f951c76011770f0155395313b3cd312f77e609492946998c4092c8ba5de46
                                                                          • Opcode Fuzzy Hash: cefd1784a89c3342f3d1d784557b734f079f755395909c775a88f3262a2f82e0
                                                                          • Instruction Fuzzy Hash: 6011D33260D24ACFE70CAB58E8522F97780EF4A275F1040BDD01E874A3D92B741B8681
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e0cb6cead816ba5e78f5f678b339ac13ccb6c90ae60da8382b421e43573a23d8
                                                                          • Instruction ID: 0b5c8d3de926ef10a12dfc98db72ccd524246cefe19944b7b0e72482db837d17
                                                                          • Opcode Fuzzy Hash: e0cb6cead816ba5e78f5f678b339ac13ccb6c90ae60da8382b421e43573a23d8
                                                                          • Instruction Fuzzy Hash: 13112952A1EB8B4EEB45577C44F15F55BA1EF5B150B0880F6D00CCB1E7DC28A8498391
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b678d007a24df69063d1b0d4ba243f5cb75a552f9f7874af8769c679a28729c4
                                                                          • Instruction ID: a7420f6eb212f60a11031b5b5f22e2c7b0216b051e54a0f2e00131d7d0c96531
                                                                          • Opcode Fuzzy Hash: b678d007a24df69063d1b0d4ba243f5cb75a552f9f7874af8769c679a28729c4
                                                                          • Instruction Fuzzy Hash: 8811D3B5E1DF888FEF95DB6848651ED7FA0EF5A340F0440EAD04DD32A2DB246809C782
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 810d850ad8a6c56a2b5dda01ea1f43208d3d43bc3f6cb665527ceba3e792e166
                                                                          • Instruction ID: 0adcdbeb8b52dafd8b579f309b46ab63b8355c25c0ec182e234afd94dd576225
                                                                          • Opcode Fuzzy Hash: 810d850ad8a6c56a2b5dda01ea1f43208d3d43bc3f6cb665527ceba3e792e166
                                                                          • Instruction Fuzzy Hash: F2119371619A468FDB99DF18C865A787791FF68340F0440ADD45DC7392CB25F8068B80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b4c8841c0e8866b1ea7a719cb9f211cf9e1cb1af69bb871044e3cdcbb0d990a9
                                                                          • Instruction ID: 24af6ef591597972364f97498a4aec2056b7fe2dd21526d1c3bdaba59380985d
                                                                          • Opcode Fuzzy Hash: b4c8841c0e8866b1ea7a719cb9f211cf9e1cb1af69bb871044e3cdcbb0d990a9
                                                                          • Instruction Fuzzy Hash: 1E114261619A4A8FDA98EF28C450B65B7A1FF59340F1481F8C44DCB297CA25F84A87D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6fbb9712b62a76b53c70561a4666ed8b6f9fe49f3ec0c0faa574fce75bc1257a
                                                                          • Instruction ID: 9569a32a454660c91c4a3822cf0fcce1c2d6b899bd1da9e370c45d4a6c1343fa
                                                                          • Opcode Fuzzy Hash: 6fbb9712b62a76b53c70561a4666ed8b6f9fe49f3ec0c0faa574fce75bc1257a
                                                                          • Instruction Fuzzy Hash: 3A115171619A4A8FDB88EF28C450B65B7A2FF59340F0480F8C44DCB297CA25F84A87C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8f6439e058bef63511a45b32ed67141ee2e3785d5cff4ec38f4d9a6ca23abff7
                                                                          • Instruction ID: 995edcb40a947969bc3874978fc5fb5d9177220baaddc7db5d4eb337138d88a8
                                                                          • Opcode Fuzzy Hash: 8f6439e058bef63511a45b32ed67141ee2e3785d5cff4ec38f4d9a6ca23abff7
                                                                          • Instruction Fuzzy Hash: 58014961A29E0F4AEB84A77C44E56B99692FF99180B5480F8D00DC7197DC28E88983D0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7684707c1817a0bbf2c867c0a678c46239462017fcd5d99a2c37d45f9f4d0831
                                                                          • Instruction ID: 51637c92ff667f03973fd4d85c1468e43819d021bc70af293b07918522b0eecd
                                                                          • Opcode Fuzzy Hash: 7684707c1817a0bbf2c867c0a678c46239462017fcd5d99a2c37d45f9f4d0831
                                                                          • Instruction Fuzzy Hash: B5115921E1EE46CBEA949B2C88661707792FF59348F54C1F9C00DC30E6DE26B80643C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: da15fbadaea97d29a4e37954c681f775e338baded661c3db44a98215f155c223
                                                                          • Instruction ID: a2581642015c83acd8e3e978f853d494f708c0f34bc2fce77fef45d2647ed1e0
                                                                          • Opcode Fuzzy Hash: da15fbadaea97d29a4e37954c681f775e338baded661c3db44a98215f155c223
                                                                          • Instruction Fuzzy Hash: 82012661A19E0B8BE698AB2CC86657477D2FF69348B54C5F9D00DC31D6DE25BC0643C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c596da94c945d7781f29f236730a44bc99a945aa731d217337ce975c6da207d4
                                                                          • Instruction ID: 2cdd9da1f6b722d3e659511bd2f71e75ecb7e0576e7ac94a5728dbe969f8b7c1
                                                                          • Opcode Fuzzy Hash: c596da94c945d7781f29f236730a44bc99a945aa731d217337ce975c6da207d4
                                                                          • Instruction Fuzzy Hash: AA01AC15E0D91786F7A8972D90B177D90D2DF893D1F5CC179C40EC22E5ED2DADC94680
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e87f0270f092dcc8f78c6fe6c35c022f4b64956c88e53c6c22e51e7aa5734597
                                                                          • Instruction ID: 6193347d4a1990c8908055ffd932c93bb535b1929a70b597fb6087f94c10e719
                                                                          • Opcode Fuzzy Hash: e87f0270f092dcc8f78c6fe6c35c022f4b64956c88e53c6c22e51e7aa5734597
                                                                          • Instruction Fuzzy Hash: 37011B78908A5D8FDB59EF18C8996A9B7B0FB54301F1002AEC05ED3261CB712999CF41
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 88e7892713e2311ece1abcd86c248c210000165421bb10e326961f3a7ab9c668
                                                                          • Instruction ID: a80c576a1cf1aa84749882c6d10782b51e48ee3872d62ea20d7831479f5ba0e3
                                                                          • Opcode Fuzzy Hash: 88e7892713e2311ece1abcd86c248c210000165421bb10e326961f3a7ab9c668
                                                                          • Instruction Fuzzy Hash: 1C017170A1B54789FE999B2D5070BF95291AF5B381F4481FCDC0ECA1E7CE18B80C82E1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c1087a4ca016c28f928cf63fd3145218e61e31894a1728ea492f357d6bf2fca6
                                                                          • Instruction ID: daa8b374158561d232452fc85710ba0d5b7651a4d3d2398276e6f82127aba2b3
                                                                          • Opcode Fuzzy Hash: c1087a4ca016c28f928cf63fd3145218e61e31894a1728ea492f357d6bf2fca6
                                                                          • Instruction Fuzzy Hash: 82F0962171A90E8FE384FB7CA85927C72C2FF9D282750467ED00EC32A7DD19AC494380
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4a7c942342290b5d5231dc8f20f85052048b0eb9c425ab17ac08da18b011738e
                                                                          • Instruction ID: bada90eb0be8141a475124819da3997b08f673658cfa4078635914d724314364
                                                                          • Opcode Fuzzy Hash: 4a7c942342290b5d5231dc8f20f85052048b0eb9c425ab17ac08da18b011738e
                                                                          • Instruction Fuzzy Hash: EE01E871D1552DCEDBA4EB28D869BE8B7A1EF99341F0041FAD00DD3261DE3469C58F40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cfd2f60f3992e1d2cf66d67dafda2406c785edc2f9642e8a7f092f80596014ca
                                                                          • Instruction ID: d8aa5f05d8b02a56b0116b99f707e0297aced64ae0b337c534d8c19f87990f18
                                                                          • Opcode Fuzzy Hash: cfd2f60f3992e1d2cf66d67dafda2406c785edc2f9642e8a7f092f80596014ca
                                                                          • Instruction Fuzzy Hash: 4EE09BB114E50C6FA61CAA55AC079F7379CE747134F00111FE18E85013F153B5238295
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5d4336dcbcf833b09a5b942142e3cac6d90e6e40db91cb63810a94d742ac389c
                                                                          • Instruction ID: 053cc0b169482326350a91eef0d634e8cf928a341729ce7ae151529890147eb6
                                                                          • Opcode Fuzzy Hash: 5d4336dcbcf833b09a5b942142e3cac6d90e6e40db91cb63810a94d742ac389c
                                                                          • Instruction Fuzzy Hash: 1F015FB491A9589FDFD4EB28C898EA8B7F0EF28301F4441E9A40DD7271DE34AD808F00
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 79f1a57ecfcf4c52e9564622820a2c0627f91ee1b20260a06a062a56ea77717b
                                                                          • Instruction ID: a8b807c382937ea28b5216a959fb03b9780e2038077e023829773f0f1a7e203e
                                                                          • Opcode Fuzzy Hash: 79f1a57ecfcf4c52e9564622820a2c0627f91ee1b20260a06a062a56ea77717b
                                                                          • Instruction Fuzzy Hash: 2EF02442B1EA498FE3969B3C58245782AD2EB9929470880FBC00CC31B3CE109C0A8382
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 746515c4aa3b5d0d269a80bdee101b97f5754722c7cb4fcefbc71c71e59ee6bd
                                                                          • Instruction ID: 8fc1c0cde45a2b507ca1cb8332ffb9183e4b2ceac76909d10947b4ff5f39b390
                                                                          • Opcode Fuzzy Hash: 746515c4aa3b5d0d269a80bdee101b97f5754722c7cb4fcefbc71c71e59ee6bd
                                                                          • Instruction Fuzzy Hash: 2FF08C11A1D6950FEB5AA73C94253F53B91CF8B320F4600E7E44DCB2E3EC499C494392
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c832d6554f950090f604d6f009591e58fb2748087c149735afba62437b1850c7
                                                                          • Instruction ID: 6848735f9aef405c862397441a64d9c1e86fb2302c1d7761ff7ba4b4ef6eb7e6
                                                                          • Opcode Fuzzy Hash: c832d6554f950090f604d6f009591e58fb2748087c149735afba62437b1850c7
                                                                          • Instruction Fuzzy Hash: F6F02782B0EB809FF368A66C94E1664AB51DB4A2D0B1889FFC00CCB0DBD800580D83D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e2097502a9391b601e5b6898c419a681974f05806b30bc16b41988fbde5234da
                                                                          • Instruction ID: 1c39a9375918de149ea740910cb3dbb7267e0620ed6d2cd5292c7046ae5a9d53
                                                                          • Opcode Fuzzy Hash: e2097502a9391b601e5b6898c419a681974f05806b30bc16b41988fbde5234da
                                                                          • Instruction Fuzzy Hash: 91F0F67290DB894FE745AB38C8AA1AA7FB1FF45240F4401FAD40CCB1A3DE289905CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9effdc12eceaa8c42f122f676cd9709637786e66c79e07e8f66404c08de261ab
                                                                          • Instruction ID: 074625a68c4bc209d83558c99eca9be7e10677e41effadca9d0fb25613a53556
                                                                          • Opcode Fuzzy Hash: 9effdc12eceaa8c42f122f676cd9709637786e66c79e07e8f66404c08de261ab
                                                                          • Instruction Fuzzy Hash: 6DE01A61B1C82A0BEB98A67CA0257F96285DF8E364F4450B5E40EC63D7EC496C8A02D6
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2f62bdf4c63cf107b49c33ebac5f360f2506c017802defd44179b294e6e3206c
                                                                          • Instruction ID: 998116b3e5ffb593aab5da9ee63ec0e5e8dd26fae7dde57c0f34b888166bc29a
                                                                          • Opcode Fuzzy Hash: 2f62bdf4c63cf107b49c33ebac5f360f2506c017802defd44179b294e6e3206c
                                                                          • Instruction Fuzzy Hash: 9EE0D86154F7D54FD7469738C4A89E07F60DE1721030900EBD485CF573E514854EC792
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f0923877604f4171daebe1d5c18e404ca000b0fd1c16e68f9400114af65a125f
                                                                          • Instruction ID: b257b52db59dd85239657c8c9d72bdd9733f3a1ac15ec65623f156cee36e9e4e
                                                                          • Opcode Fuzzy Hash: f0923877604f4171daebe1d5c18e404ca000b0fd1c16e68f9400114af65a125f
                                                                          • Instruction Fuzzy Hash: 3FE0127191DA4A8FE784DB1CD4A29A5FBD0FB98294F40067EE08DD2261DA25D9808B42
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 67e9f63047aaca6e740d68d69a9267b0614511650995f65b4f8d377ae2af4e0f
                                                                          • Instruction ID: 8931e972890418ca62e1f69b5342c484798c19ada47e07cb74e50756ea64dbfb
                                                                          • Opcode Fuzzy Hash: 67e9f63047aaca6e740d68d69a9267b0614511650995f65b4f8d377ae2af4e0f
                                                                          • Instruction Fuzzy Hash: EDC012A2616506CAE654A33C01292B89281FB5E180B5044B4D00ED31E3EC1C64468290
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1a0ce64e7bb0b6cf2d2a83308223c33fad149cbb7e5e409e1cf76f611570199f
                                                                          • Instruction ID: 45825c04111cf21ecf79062a60480aa628508113ec904f53260e6fc6b34ba3ac
                                                                          • Opcode Fuzzy Hash: 1a0ce64e7bb0b6cf2d2a83308223c33fad149cbb7e5e409e1cf76f611570199f
                                                                          • Instruction Fuzzy Hash: 63C09B20E1A587C6F544EF38455127D51566F8E241F50C57DD00E811A7CD3D751655C5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Ba$JrA$JrA$JrA$JrA$JrA
                                                                          • API String ID: 0-523104986
                                                                          • Opcode ID: 1c18d19c62ec7db7bc372c19b8d519db67526ec3a79aef6fe8ddbe2c0a9fd50b
                                                                          • Instruction ID: b4ceb3307d6105d9c2feae0009a96695d35af0780dc5257b85eec83b7bc0fdb2
                                                                          • Opcode Fuzzy Hash: 1c18d19c62ec7db7bc372c19b8d519db67526ec3a79aef6fe8ddbe2c0a9fd50b
                                                                          • Instruction Fuzzy Hash: B5512892E1FA935AE325537C48272E5EB85DF5A792F4845F9F18CC61D2EC08780E42C2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.2630210322.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffaab860000_ScreenConnect.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Ba$JrA$JrA$JrA$JrA$JrA
                                                                          • API String ID: 0-523104986
                                                                          • Opcode ID: 58130d5be37cb57778fa22b389e96cb18386e4b2a34a674f4ec512c693237df2
                                                                          • Instruction ID: 7240a30bb9b7bb34a5c7745cc18196b1a807c60cd885b4ce34dad39236cff897
                                                                          • Opcode Fuzzy Hash: 58130d5be37cb57778fa22b389e96cb18386e4b2a34a674f4ec512c693237df2
                                                                          • Instruction Fuzzy Hash: 0141F892A1FA8757E369A37C4C232E5EA85DF1A252F5845F9F08DC61D3EC0C780E42C2