Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dMDImIGmc7.exe

Overview

General Information

Sample name:dMDImIGmc7.exe
renamed because original name is a hash value
Original sample name:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085.exe
Analysis ID:1572419
MD5:4221ca1a9f9f6e0c9b9ddd58e2c2f863
SHA1:812eda18b362a8f6cdc7aad46967fba7782427d2
SHA256:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085
Tags:exexluzoia8user-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:66
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:47
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • dMDImIGmc7.exe (PID: 3392 cmdline: "C:\Users\user\Desktop\dMDImIGmc7.exe" MD5: 4221CA1A9F9F6E0C9B9DDD58E2C2F863)
    • msiexec.exe (PID: 7024 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 3380 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5552 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding D3E1898133ED9999B5435F45ED30FB35 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7100 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9353.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6329359 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 2448 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 0884BA7819EE95392B8E2AF813B055D4 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 6424 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding B1B23A5FAA1E60E409692560D2F5180C E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 3200 cmdline: "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=56508de8-6680-487c-bf67-90da90fb8804&k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE" MD5: 75B21D04C69128A7230A0998086B61AA)
    • ScreenConnect.WindowsClient.exe (PID: 7200 cmdline: "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "e948cbc7-54e9-45ff-a001-4f3f5173abca" "User" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
  • svchost.exe (PID: 7392 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dMDImIGmc7.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Installer\inprogressinstallinfo.ipiJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Temp\~DFDC8B2D8878F33546.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Temp\~DF12B3ED92C5317D98.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          C:\Windows\Temp\~DFE465DACC87925B32.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            C:\Windows\Temp\~DFE8021363BD46873C.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000002.2220093933.0000000005900000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000009.00000002.4030878089.0000000003071000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      Process Memory Space: dMDImIGmc7.exe PID: 3392JoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        Click to see the 3 entries
                        SourceRuleDescriptionAuthorStrings
                        0.2.dMDImIGmc7.exe.5900000.13.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          9.2.ScreenConnect.WindowsClient.exe.30efa18.3.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            9.0.ScreenConnect.WindowsClient.exe.e00000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              0.2.dMDImIGmc7.exe.5900000.13.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                0.0.dMDImIGmc7.exe.b05db0.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                  Click to see the 3 entries

                                  System Summary

                                  barindex
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (65d97bc8a263f920) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 3380, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-D186-9B9F99980CD0}\(Default)
                                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7392, ProcessName: svchost.exe
                                  No Suricata rule has matched

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: dMDImIGmc7.exeReversingLabs: Detection: 26%
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.4% probability
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeEXE: msiexec.exeJump to behavior

                                  Compliance

                                  barindex
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeEXE: msiexec.exeJump to behavior
                                  Source: dMDImIGmc7.exeStatic PE information: certificate valid
                                  Source: dMDImIGmc7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdba source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.0000000000697000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: dMDImIGmc7.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: ase\net20\ScreenConnect.Core.pdb source: rundll32.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.4046007434.0000000002177000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dMDImIGmc7.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.PDBbbWn source: ScreenConnect.ClientService.exe, 00000008.00000002.4055172190.0000000003FB0000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4044952998.000000001B942000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4030878089.0000000003071000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4030694663.0000000003000000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.2221687477.00000000004AD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2195854812.0000000004E60000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: dMDImIGmc7.exe, MSI996E.tmp.3.dr, 60970f.msi.3.dr, 60970e.rbs.3.dr, MSI997F.tmp.3.dr, ScreenConnect.ClientSetup.msi.0.dr, 60970d.msi.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.4046007434.0000000002177000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: dMDImIGmc7.exe, 60970f.msi.3.dr, MSI9353.tmp.2.dr, ScreenConnect.ClientSetup.msi.0.dr, 60970d.msi.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4030405028.0000000002FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4030405028.0000000002FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.pdbJb/n source: ScreenConnect.ClientService.exe, 00000008.00000002.4055172190.0000000003FB0000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.4046007434.0000000002177000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: dMDImIGmc7.exe
                                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile opened: c:
                                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                                  Networking

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficDNS traffic detected: DNS query: instance-jqk235-relay.screenconnect.com
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: svchost.exe, 0000000A.00000002.3913412398.000001EFD1A00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                                  Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                                  Source: qmgr.db.10.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/2
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/N
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/V
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/X
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.000000000129E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000014A5000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.000000000153B000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.0000000001347000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000013EE000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000012CB000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.000000000160D000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000015E2000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.0000000001417000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/d
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-jqk235-relay.screenconnect.com:443/n
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2190524504.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000011D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193643012.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                                  Source: rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193643012.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                                  Source: rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193643012.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                                  Source: dMDImIGmc7.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                                  Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
                                  Source: qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                                  Source: svchost.exe, 0000000A.00000003.2269318522.000001EFD17B0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                                  System Summary

                                  barindex
                                  Source: dMDImIGmc7.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_04F80040 CreateProcessAsUserW,8_2_04F80040
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\60970d.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{725BED6F-EB1D-3595-B4AC-1BF7669F9138}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI996E.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI997F.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9F9A.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\60970f.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\60970f.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{725BED6F-EB1D-3595-B4AC-1BF7669F9138}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{725BED6F-EB1D-3595-B4AC-1BF7669F9138}\DefaultIconJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.SchedServiceConfig.rmiJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\xjknrq1f.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\xjknrq1f.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\nfah0ncf.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\nfah0ncf.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\ihaprdqf.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\ihaprdqf.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\hn2yqimm.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\hn2yqimm.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\kdond0cc.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\kdond0cc.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\t1kk0k0h.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\t1kk0k0h.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\551sspa4.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\551sspa4.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\vo2jenka.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\vo2jenka.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\tztesu1i.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\tztesu1i.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\iun31gdc.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (65d97bc8a263f920)\iun31gdc.newcfgJump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI997F.tmpJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_058787B80_2_058787B8
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_0587BA300_2_0587BA30
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_058787A80_2_058787A8
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05877D800_2_05877D80
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05890CB80_2_05890CB8
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05891E9B0_2_05891E9B
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_010BD5688_2_010BD568
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389D26F9_2_00007FFD3389D26F
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389EE0D9_2_00007FFD3389EE0D
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389BB779_2_00007FFD3389BB77
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389BB859_2_00007FFD3389BB85
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389A0AD9_2_00007FFD3389A0AD
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD338910D79_2_00007FFD338910D7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD338910CF9_2_00007FFD338910CF
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389EE689_2_00007FFD3389EE68
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD3389EE4D9_2_00007FFD3389EE4D
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD338A2CFA9_2_00007FFD338A2CFA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BA77FB9_2_00007FFD33BA77FB
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BA000A9_2_00007FFD33BA000A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BA92F69_2_00007FFD33BA92F6
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BACAFB9_2_00007FFD33BACAFB
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BA65A19_2_00007FFD33BA65A1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BACB109_2_00007FFD33BACB10
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BAB6D19_2_00007FFD33BAB6D1
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2207466091.0000000005570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2197384603.0000000004183000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000F7F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000F7F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2190524504.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2190524504.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2190524504.00000000038A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2208107939.0000000005600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2231111847.0000000007EE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exe.muiX vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2231111847.0000000007EE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exeX vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2220093933.0000000005ABC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2220093933.0000000005ABC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2220093933.0000000005ABC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2220093933.0000000005ABC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2190127952.0000000002F60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2208845758.0000000005690000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2208845758.0000000005690000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2208845758.0000000005690000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenamezlib.dll2 vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenamewixca.dll\ vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs dMDImIGmc7.exe
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.dMDImIGmc7.exe.a563d4.5.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                                  Source: 0.2.dMDImIGmc7.exe.5690000.10.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: 0.2.dMDImIGmc7.exe.5690000.10.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.2.dMDImIGmc7.exe.5690000.10.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.2.dMDImIGmc7.exe.5690000.10.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: classification engineClassification label: mal66.evad.winEXE@16/66@5/2
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)Jump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dMDImIGmc7.exe.logJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeMutant created: NULL
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                                  Source: dMDImIGmc7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: dMDImIGmc7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9353.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6329359 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: dMDImIGmc7.exeReversingLabs: Detection: 26%
                                  Source: dMDImIGmc7.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                  Source: dMDImIGmc7.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile read: C:\Users\user\Desktop\dMDImIGmc7.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\dMDImIGmc7.exe "C:\Users\user\Desktop\dMDImIGmc7.exe"
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"
                                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D3E1898133ED9999B5435F45ED30FB35 C
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9353.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6329359 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0884BA7819EE95392B8E2AF813B055D4
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B1B23A5FAA1E60E409692560D2F5180C E Global\MSI0000
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=56508de8-6680-487c-bf67-90da90fb8804&k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE"
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "e948cbc7-54e9-45ff-a001-4f3f5173abca" "User"
                                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D3E1898133ED9999B5435F45ED30FB35 CJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0884BA7819EE95392B8E2AF813B055D4Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B1B23A5FAA1E60E409692560D2F5180C E Global\MSI0000Jump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9353.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6329359 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "e948cbc7-54e9-45ff-a001-4f3f5173abca" "User"Jump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: rtutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeSection loaded: dwrite.dllJump to behavior
                                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: dMDImIGmc7.exeStatic PE information: certificate valid
                                  Source: dMDImIGmc7.exeStatic file information: File size 5620136 > 1048576
                                  Source: dMDImIGmc7.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: dMDImIGmc7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: dMDImIGmc7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdba source: ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.0000000000697000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: dMDImIGmc7.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: ase\net20\ScreenConnect.Core.pdb source: rundll32.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.4046007434.0000000002177000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dMDImIGmc7.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.PDBbbWn source: ScreenConnect.ClientService.exe, 00000008.00000002.4055172190.0000000003FB0000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4044952998.000000001B942000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4030878089.0000000003071000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4030694663.0000000003000000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: dMDImIGmc7.exe
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.2221687477.00000000004AD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2195854812.0000000004E60000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: dMDImIGmc7.exe, MSI996E.tmp.3.dr, 60970f.msi.3.dr, 60970e.rbs.3.dr, MSI997F.tmp.3.dr, ScreenConnect.ClientSetup.msi.0.dr, 60970d.msi.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: dMDImIGmc7.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.4046007434.0000000002177000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: dMDImIGmc7.exe, 60970f.msi.3.dr, MSI9353.tmp.2.dr, ScreenConnect.ClientSetup.msi.0.dr, 60970d.msi.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4030405028.0000000002FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4030405028.0000000002FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.pdbJb/n source: ScreenConnect.ClientService.exe, 00000008.00000002.4055172190.0000000003FB0000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.4046007434.0000000002177000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.4042125375.0000000013080000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: dMDImIGmc7.exe
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: dMDImIGmc7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                  Data Obfuscation

                                  barindex
                                  Source: 0.2.dMDImIGmc7.exe.2f60000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                                  Source: dMDImIGmc7.exeStatic PE information: real checksum: 0x54d1c1 should be: 0x5675b7
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_014670B0 push eax; mov dword ptr [esp], ecx0_2_014670C1
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05876460 pushfd ; retf 0_2_05876461
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05873AD7 push ebx; retf 0_2_05873ADA
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_058949EB push eax; mov dword ptr [esp], edx0_2_058949F4
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05893590 push eax; mov dword ptr [esp], ecx0_2_058935A1
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05893A99 push ebx; retf 0_2_05893ADA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_037C39CF push ebx; retf 8_2_037C3ADA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_04F88848 pushfd ; iretd 8_2_04F88851
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD338A08CD push ebx; retf 9_2_00007FFD338A098A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD338900BD pushad ; iretd 9_2_00007FFD338900C1
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BAC1B6 push cs; iretd 9_2_00007FFD33BAC23F
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFD33BA7540 push ebx; iretd 9_2_00007FFD33BA756A

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: c:\program files (x86)\screenconnect client (65d97bc8a263f920)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-d186-9b9f99980cd0}\inprocserver32
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI997F.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9F9A.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI997F.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9F9A.tmpJump to dropped file
                                  Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (65d97bc8a263f920)Jump to behavior

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: dMDImIGmc7.exe, 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: dMDImIGmc7.exe, 00000000.00000002.2208845758.0000000005690000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: rundll32.exe, 00000005.00000003.2193437050.0000000004FE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4049154872.000000001BF72000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4044952998.000000001B942000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4030878089.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.4030694663.0000000003000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: dMDImIGmc7.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 1420000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 2FC0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 1480000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 6750000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: 5E30000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMemory allocated: 10B0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMemory allocated: 1170000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeMemory allocated: 1850000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeMemory allocated: 1B070000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI997F.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9F9A.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeAPI coverage: 2.1 %
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exe TID: 5424Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe TID: 7184Thread sleep count: 66 > 30Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe TID: 7460Thread sleep time: -30000s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\svchost.exe TID: 7416Thread sleep time: -30000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 7692Thread sleep time: -30000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeLast function: Thread delayed
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeLast function: Thread delayed
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.4055172190.0000000003FB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.
                                  Source: svchost.exe, 0000000A.00000002.3912637834.000001EFCC22B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3913547325.000001EFD1A57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeMemory allocated: page read and write | page guardJump to behavior

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                                  Source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                                  Source: 0.2.dMDImIGmc7.exe.2f60000.0.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (65d97bc8a263f920)\screenconnect.clientservice.exe" "?e=access&y=guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=56508de8-6680-487c-bf67-90da90fb8804&k=bgiaaackaabsu0exaagaaaeaaqcflxydurhermiw7%2fdjmbn4kt%2bzyqufmz9tdkd6iuwhl0tx7eqyjvjwqck9bbnlxrevgy0d%2bi2hgkweucucvgzyhkiygple75sbfoihluunwnxge4hut7fyaqzpmwhbg9wjhkinwnz48oytj3wdlnwvm1aglpzosvmc81lgzimk2f20l3ytsr71eudyff4mjuecdzdunss38hqmnm9k2oygsqmvi6d5mbnblfu5yiei3306j9iigalvfmuj%2b6%2fqmdfym1dlm1qc2ut2gm%2b79f1e4wq7hn0vtxrxkvj2nhexc9t8vzmoeq9p2cgsizlqjqmzsub1gud9kbjfewgmvide"
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                                  Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exeCode function: 8_2_04F81120 CreateNamedPipeW,8_2_04F81120
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeCode function: 0_2_05872D07 RtlGetVersion,0_2_05872D07
                                  Source: C:\Users\user\Desktop\dMDImIGmc7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                                  Source: Yara matchFile source: dMDImIGmc7.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.2.dMDImIGmc7.exe.5900000.13.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.30efa18.3.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.e00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.2.dMDImIGmc7.exe.5900000.13.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.b05db0.4.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.a563d4.5.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.adc3d4.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.dMDImIGmc7.exe.a40000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.2220093933.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000002.4030878089.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: dMDImIGmc7.exe PID: 3392, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7100, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: ScreenConnect.ClientService.exe PID: 3200, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7200, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Windows\Installer\inprogressinstallinfo.ipi, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DFDC8B2D8878F33546.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF12B3ED92C5317D98.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DFE465DACC87925B32.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DFE8021363BD46873C.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF7C2EBFC6BD78F3C5.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF015EEA789F94F6E5.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Config.Msi\60970e.rbs, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Installer\MSI996E.tmp, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity InformationAcquire Infrastructure1
                                  Valid Accounts
                                  1
                                  Native API
                                  1
                                  DLL Side-Loading
                                  1
                                  DLL Side-Loading
                                  11
                                  Disable or Modify Tools
                                  OS Credential Dumping11
                                  Peripheral Device Discovery
                                  Remote Services11
                                  Archive Collected Data
                                  12
                                  Encrypted Channel
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomains1
                                  Replication Through Removable Media
                                  12
                                  Command and Scripting Interpreter
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  Deobfuscate/Decode Files or Information
                                  LSASS Memory1
                                  File and Directory Discovery
                                  Remote Desktop ProtocolData from Removable Media1
                                  Non-Application Layer Protocol
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain AccountsAt1
                                  Component Object Model Hijacking
                                  1
                                  Component Object Model Hijacking
                                  1
                                  Obfuscated Files or Information
                                  Security Account Manager24
                                  System Information Discovery
                                  SMB/Windows Admin SharesData from Network Shared Drive2
                                  Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal AccountsCron1
                                  Valid Accounts
                                  1
                                  Valid Accounts
                                  1
                                  Software Packing
                                  NTDS11
                                  Security Software Discovery
                                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchd2
                                  Windows Service
                                  1
                                  Access Token Manipulation
                                  1
                                  DLL Side-Loading
                                  LSA Secrets2
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                                  Bootkit
                                  2
                                  Windows Service
                                  1
                                  DLL Search Order Hijacking
                                  Cached Domain Credentials41
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                                  Process Injection
                                  1
                                  File Deletion
                                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                                  Masquerading
                                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                                  Valid Accounts
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                                  Access Token Manipulation
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd41
                                  Virtualization/Sandbox Evasion
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                                  Process Injection
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                                  Hidden Users
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                                  Bootkit
                                  Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                                  Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                                  Rundll32
                                  Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572419 Sample: dMDImIGmc7.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 66 55 server-nix0992c762-relay.screenconnect.com 2->55 57 instance-jqk235-relay.screenconnect.com 2->57 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 .NET source code references suspicious native API functions 2->69 71 4 other signatures 2->71 8 msiexec.exe 94 48 2->8         started        12 ScreenConnect.ClientService.exe 17 23 2->12         started        15 dMDImIGmc7.exe 6 2->15         started        17 svchost.exe 2->17         started        signatures3 process4 dnsIp5 35 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->35 dropped 37 C:\...\ScreenConnect.ClientService.exe, PE32 8->37 dropped 39 C:\Windows\Installer\MSI9F9A.tmp, PE32 8->39 dropped 43 9 other files (none is malicious) 8->43 dropped 73 Enables network access during safeboot for specific services 8->73 75 Modifies security policies related information 8->75 19 msiexec.exe 8->19         started        21 msiexec.exe 1 8->21         started        23 msiexec.exe 8->23         started        59 server-nix0992c762-relay.screenconnect.com 147.28.146.16, 443, 49724, 49736 RGNET-SEARGnetSeattleWestinEE United States 12->59 77 Reads the Security eventlog 12->77 79 Reads the System eventlog 12->79 25 ScreenConnect.WindowsClient.exe 2 12->25         started        41 C:\Users\user\AppData\...\dMDImIGmc7.exe.log, ASCII 15->41 dropped 81 Contains functionality to hide user accounts 15->81 28 msiexec.exe 6 15->28         started        61 127.0.0.1 unknown unknown 17->61 file6 signatures7 process8 file9 31 rundll32.exe 11 19->31         started        83 Contains functionality to hide user accounts 25->83 45 C:\Users\user\AppData\Local\...\MSI9353.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 63 Contains functionality to hide user accounts 31->63 signatures13

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  dMDImIGmc7.exe26%ReversingLabsWin32.Ransomware.ScreenConnectTool
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI9353.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Windows\Installer\MSI997F.tmp0%ReversingLabs
                                  C:\Windows\Installer\MSI9F9A.tmp0%ReversingLabs
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://instance-jqk235-relay.screenconnect.com:443/V0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/N0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/d0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/X0%Avira URL Cloudsafe
                                  http://instance-jqk235-relay.screenconnect.com:443/20%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  server-nix0992c762-relay.screenconnect.com
                                  147.28.146.16
                                  truefalse
                                    unknown
                                    fp2e7a.wpc.phicdn.net
                                    192.229.221.95
                                    truefalse
                                      high
                                      instance-jqk235-relay.screenconnect.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://instance-jqk235-relay.screenconnect.com:443/NScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://instance-jqk235-relay.screenconnect.com:443/nScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193643012.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                            high
                                            https://g.live.com/odclientsettings/Prod1C:qmgr.db.10.drfalse
                                              high
                                              http://instance-jqk235-relay.screenconnect.com:443/XScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://instance-jqk235-relay.screenconnect.com:443/VScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193643012.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                                high
                                                https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                                  high
                                                  http://instance-jqk235-relay.screenconnect.com:443/2ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                                    high
                                                    https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 0000000A.00000003.2269318522.000001EFD17B0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drfalse
                                                      high
                                                      http://crl.ver)svchost.exe, 0000000A.00000002.3913412398.000001EFD1A00000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://instance-jqk235-relay.screenconnect.com:443/ScreenConnect.ClientService.exe, 00000008.00000002.4028702659.000000000072F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.2193437050.0000000004FD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193437050.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2193643012.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                                          high
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedMDImIGmc7.exe, 00000000.00000002.2190524504.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000011D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://instance-jqk235-relay.screenconnect.com:443/dScreenConnect.ClientService.exe, 00000008.00000002.4032089593.000000000129E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000014A5000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.000000000153B000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.0000000001347000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000013EE000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000012CB000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.000000000160D000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.00000000015E2000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.4032089593.0000000001417000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            147.28.146.16
                                                            server-nix0992c762-relay.screenconnect.comUnited States
                                                            3130RGNET-SEARGnetSeattleWestinEEfalse
                                                            IP
                                                            127.0.0.1
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1572419
                                                            Start date and time:2024-12-10 15:10:42 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 9m 19s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Run name:Run with higher sleep bypass
                                                            Number of analysed new started processes analysed:22
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:dMDImIGmc7.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085.exe
                                                            Detection:MAL
                                                            Classification:mal66.evad.winEXE@16/66@5/2
                                                            EGA Information:
                                                            • Successful, ratio: 75%
                                                            HCA Information:
                                                            • Successful, ratio: 77%
                                                            • Number of executed functions: 300
                                                            • Number of non-executed functions: 2
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                                            • Excluded IPs from analysis (whitelisted): 23.218.208.109, 20.190.147.2, 20.223.35.26, 13.107.246.63, 4.245.163.56, 2.16.158.184, 150.171.27.10, 172.202.163.200, 2.16.158.82
                                                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, prod.fs.microsoft.com.akadns.net
                                                            • Execution Graph export aborted for target rundll32.exe, PID 7100 because it is empty
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                                            • VT rate limit hit for: dMDImIGmc7.exe
                                                            No simulations
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            fp2e7a.wpc.phicdn.netxUPaeKk5wQ.msiGet hashmaliciousAteraAgentBrowse
                                                            • 192.229.221.95
                                                            7gBUqzSN3y.msiGet hashmaliciousAteraAgentBrowse
                                                            • 192.229.221.95
                                                            PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                            • 192.229.221.95
                                                            New Order Enquiry.jsGet hashmaliciousAgentTeslaBrowse
                                                            • 192.229.221.95
                                                            10122024Hesap hareketleriniz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 192.229.221.95
                                                            https://upadhritinigam8200.wixsite.com/so/dbPE7tTKy/c?w=NWGcWR-r5dqFIb4OQ5ZMkarKaMiSJ7tegoCJLhSpN2Y.eyJ1IjoiaHR0cHM6Ly9hbGtlYW93cy5jb20vaG9tZS5waHAiLCJyIjoiMTBiYTY0NTUtYzhlZi00YTlkLTkxMWItNjFiODdlNzNkMDMwIiwibSI6Im1haWwiLCJjIjoiYjU5NTYwYTctNDM5Ni00ODUxLThlYmYtYWQ3MTFlNWNiZWFjIn0Get hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                            • 192.229.221.95
                                                            w6XbxNnane.exeGet hashmaliciousGo StealerBrowse
                                                            • 192.229.221.95
                                                            DqEJwd61Uw.exeGet hashmaliciousZhark RATBrowse
                                                            • 192.229.221.95
                                                            DHL_46049595.exeGet hashmaliciousFormBookBrowse
                                                            • 192.229.221.95
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            RGNET-SEARGnetSeattleWestinEEBA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                            • 147.28.185.29
                                                            x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 147.28.80.240
                                                            AdobeAcrobatReader.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 147.28.129.0
                                                            AdobeAcrobatReader.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 147.28.129.0
                                                            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                            • 147.28.142.90
                                                            5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 147.28.129.8
                                                            5iT2ITz44g.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 147.28.129.8
                                                            statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 147.28.129.128
                                                            statment.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 147.28.129.128
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.Client.dllestatement020134230003.exe.virus.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              estatement020134230003.exe.virus.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                Support.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  f53WqfzzNt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    tiG6Ep202n.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      6IqUjK9Koj.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                        f53WqfzzNt.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                          tiG6Ep202n.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            6IqUjK9Koj.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:modified
                                                                              Size (bytes):219471
                                                                              Entropy (8bit):6.583369876784073
                                                                              Encrypted:false
                                                                              SSDEEP:3072:Bh9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGW:BhuH2aCGw1ST1wQLdqvW
                                                                              MD5:E80C990606641880AD6FEDEBE9B1E837
                                                                              SHA1:F9C4E6ECC6C0569E9879156326141BB666AF58AA
                                                                              SHA-256:DF64D5AD3F6D5D4D3248A598A3BBBCA36F8306C0AF9336981228F2996CD800F1
                                                                              SHA-512:E89143F7D845D0D246CD4B5A82AFB60DD44CBDE979A1F08CC2BDC6BC39235DBA27FB3698B8D316CDCEA246BDC0A255E8950B70863F12ADBEB374059703AE7747
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\60970e.rbs, Author: Joe Security
                                                                              Preview:...@IXOS.@.....@uI.Y.@.....@.....@.....@.....@.....@......&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}'.ScreenConnect Client (65d97bc8a263f920)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (65d97bc8a263f920)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{91803B2D-BCE4-4D75-2001-714374EA8E7A}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{BCD3735B-7A0B-F604-901A-84A4EB8DB724}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{B65B3FD6-55AB-3FB4-4975-FA5784A90593}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{AE0C6BF4-CA9E-EF54-C309-18275C0999FC}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{23759C26-3715-0BCF-3EBB-F5C4FF79A081}&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.@......&.{B82A04C0-B2DA-C30C-D7C6-1D8025EA2D1F}&.{725BED6F-EB1D-3595-B4AC
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):50133
                                                                              Entropy (8bit):4.759054454534641
                                                                              Encrypted:false
                                                                              SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                              MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                              SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                              SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                              SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                              Malicious:false
                                                                              Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):26722
                                                                              Entropy (8bit):7.7401940386372345
                                                                              Encrypted:false
                                                                              SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                              MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                              SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                              SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                              SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                              Malicious:false
                                                                              Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):197120
                                                                              Entropy (8bit):6.586775768189165
                                                                              Encrypted:false
                                                                              SSDEEP:3072:/xLtNGTlIyS7/ObjusqVFJRJcyzvYqSmzDvJXYF:FtNGTGySabqPJYbqSmG
                                                                              MD5:3724F06F3422F4E42B41E23ACB39B152
                                                                              SHA1:1220987627782D3C3397D4ABF01AC3777999E01C
                                                                              SHA-256:EA0A545F40FF491D02172228C1A39AE68344C4340A6094486A47BE746952E64F
                                                                              SHA-512:509D9A32179A700AD76471B4CD094B8EB6D5D4AE7AD15B20FD76C482ED6D68F44693FC36BCB3999DA9346AE9E43375CD8FE02B61EDEABE4E78C4E2E44BF71D42
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Joe Sandbox View:
                                                                              • Filename: estatement020134230003.exe.virus.exe, Detection: malicious, Browse
                                                                              • Filename: estatement020134230003.exe.virus.exe, Detection: malicious, Browse
                                                                              • Filename: Support.ClientSetup.exe, Detection: malicious, Browse
                                                                              • Filename: f53WqfzzNt.exe, Detection: malicious, Browse
                                                                              • Filename: tiG6Ep202n.exe, Detection: malicious, Browse
                                                                              • Filename: 6IqUjK9Koj.exe, Detection: malicious, Browse
                                                                              • Filename: f53WqfzzNt.exe, Detection: malicious, Browse
                                                                              • Filename: tiG6Ep202n.exe, Detection: malicious, Browse
                                                                              • Filename: 6IqUjK9Koj.exe, Detection: malicious, Browse
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ... ....... .......................`......#.....@.................................A...O.... ..|....................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B................u.......H...........4............_...... .........................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):68096
                                                                              Entropy (8bit):6.06942231395039
                                                                              Encrypted:false
                                                                              SSDEEP:1536:+A0ZscQ5V6TsQqoSD6h6+39QFVIl1zJhb8gq:p0Zy3gUOQFVQzJq
                                                                              MD5:5DB908C12D6E768081BCED0E165E36F8
                                                                              SHA1:F2D3160F15CFD0989091249A61132A369E44DEA4
                                                                              SHA-256:FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
                                                                              SHA-512:8400486CADB7C07C08338D8876BC14083B6F7DE8A8237F4FE866F4659139ACC0B587EB89289D281106E5BAF70187B3B5E86502A2E340113258F03994D959328D
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nu............" ..0.............. ... ...@....... ..............................p.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):95512
                                                                              Entropy (8bit):6.504684691533346
                                                                              Encrypted:false
                                                                              SSDEEP:1536:Eg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkggU0HMx790K:dhbNDxZGXfdHrX7rAc6myJkggU0HqB
                                                                              MD5:75B21D04C69128A7230A0998086B61AA
                                                                              SHA1:244BD68A722CFE41D1F515F5E40C3742BE2B3D1D
                                                                              SHA-256:F1B5C000794F046259121C63ED37F9EFF0CFE1258588ECA6FD85E16D3922767E
                                                                              SHA-512:8D51B2CD5F21C211EB8FEA4B69DC9F91DFFA7BB004D9780C701DE35EAC616E02CA30EF3882D73412F7EAB1211C5AA908338F3FA10FDF05B110F62B8ECD9D24C2
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................>)....@.................................p...x....`..P............L...)...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):548864
                                                                              Entropy (8bit):6.034211651049746
                                                                              Encrypted:false
                                                                              SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                              MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                              SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                              SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                              SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1721856
                                                                              Entropy (8bit):6.639085961200334
                                                                              Encrypted:false
                                                                              SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                              MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                              SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                              SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                              SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):260168
                                                                              Entropy (8bit):6.416438906122177
                                                                              Encrypted:false
                                                                              SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                              MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                              SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                              SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                              SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):61208
                                                                              Entropy (8bit):6.310126082367387
                                                                              Encrypted:false
                                                                              SSDEEP:1536:kW/+lo6MOc8IoiKWjrNv8DtyQ4RE+TC6WAhVbb57bP8:kLlo6dccldyQGWy5s
                                                                              MD5:AFA97CAF20F3608799E670E9D6253247
                                                                              SHA1:7E410FDE0CA1350AA68EF478E48274888688F8EE
                                                                              SHA-256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
                                                                              SHA-512:FE0B378651783EF4ADD3851E12291C82EDCCDE1DBD1FA0B76D7A2C2DCD181E013B9361BBDAE4DAE946C0D45FB4BF6F75DC027F217326893C906E47041E3039B0
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c+..........."...0.................. ........@.. ....................... .......r....@.....................................O....... ................)..............8............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):266
                                                                              Entropy (8bit):4.842791478883622
                                                                              Encrypted:false
                                                                              SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                              MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                              SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                              SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                              SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):602392
                                                                              Entropy (8bit):6.176232491934078
                                                                              Encrypted:false
                                                                              SSDEEP:6144:fybAk1FVMVTZL/4TvqpU0pSdRW3akod1sI5mgve8mZXuRFtSc4q2/R4IEyxuV5AN:qbAOwJ/MvIFptJoR5NmtiFsxsFE
                                                                              MD5:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                              SHA1:0203B65E92D2D1200DD695FE4C334955BEFBDDD3
                                                                              SHA-256:600CF10E27311E60D32722654EF184C031A77B5AE1F8ABAE8891732710AFEE31
                                                                              SHA-512:A902080FF8EE0D9AEFFA0B86E7980457A4E3705789529C82679766580DF0DC17535D858FBE50731E00549932F6D49011868DEE4181C6716C36379AD194B0ED69
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............@.................................M...O.... ...................)...@..........8............................................ ............... ..H............text...p.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......XJ......................$.........................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):266
                                                                              Entropy (8bit):4.842791478883622
                                                                              Encrypted:false
                                                                              SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                              MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                              SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                              SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                              SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):842248
                                                                              Entropy (8bit):6.268561504485627
                                                                              Encrypted:false
                                                                              SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                              MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                              SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                              SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                              SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):81688
                                                                              Entropy (8bit):5.8618809599146005
                                                                              Encrypted:false
                                                                              SSDEEP:1536:Ety9l44Kzb1I5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7j27Vy:PvqukLdn2s
                                                                              MD5:1AEE526DC110E24D1399AFFCCD452AB3
                                                                              SHA1:04DB0E8772933BC57364615D0D104DC2550BD064
                                                                              SHA-256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
                                                                              SHA-512:482A8EE35D53BE907BE39DBD6C46D1F45656046BACA95630D1F07AC90A66F0E61D41F940FB166677AC4D5A48CF66C28E76D89912AED3D673A80737732E863851
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o..........."...0..@...........^... ...`....@.. .......................`.......$....@..................................^..O....`...................)...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):266
                                                                              Entropy (8bit):4.842791478883622
                                                                              Encrypted:false
                                                                              SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                              MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                              SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                              SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                              SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:XML 1.0 document, ASCII text, with very long lines (466), with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):956
                                                                              Entropy (8bit):5.787993993731163
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dL9hK6E4dl/5YuPmhIkW2gUyD7mrF3rJpDFvH:chh7HH5diIkW2Py/wbjhv
                                                                              MD5:C97206140498FE72BA84EF8D7F20EB0B
                                                                              SHA1:9CDB5D4AB805305AFA4827555874AE1A96454DB7
                                                                              SHA-256:815245B927B93F64ED5792A0C617E3EDD46EE3817A46D4D87F29E5CED2B64568
                                                                              SHA-512:E42232A01F51BA0651FCC956EE56144E78C3F6E98150D19EF59CF22843B386F0E158E2584B76F9606E828ACFFFCF18EDB41954D6798FABA3D7779183703B1F55
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=instance-jqk235-relay.screenconnect.com&amp;p=443&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):8192
                                                                              Entropy (8bit):0.35901589905449205
                                                                              Encrypted:false
                                                                              SSDEEP:6:6xKdoaaD0JOCEfMuaaD0JOCEfMKQmDCexKdoaaD0JOCEfMuaaD0JOCEfMKQmDC:6aaD0JcaaD0JwQQHaaD0JcaaD0JwQQ
                                                                              MD5:C788EDB928436D0CE10A5BF198837D8A
                                                                              SHA1:F104B6AB797E0B16362BFB69F5000407CE6EFFD8
                                                                              SHA-256:E309925E38D727B91C5B0AD9FC86A778ECD0EBE80261F55E870AD6685B0CC0BD
                                                                              SHA-512:61F750C97F2E1EAF623486147F55B4BF39C34DF28DD124FA378973965A2AE0AAA967D71C88BE0D02E1B2D2B22E20199B9E817BE793A10C0CC9D12FE703E18CF2
                                                                              Malicious:false
                                                                              Preview:*.>...........k.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................k.............................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1310720
                                                                              Entropy (8bit):0.7303750450572186
                                                                              Encrypted:false
                                                                              SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0T:9JZj5MiKNnNhoxum
                                                                              MD5:6A73ECD8C741823B3C48661513C769AF
                                                                              SHA1:88C5126995A9302F99DF49EF671EEAE29F869682
                                                                              SHA-256:7BBFF0E070E8E5D1B7BA759D59C05C2FC605BB22E679FED39573E720EEEB8720
                                                                              SHA-512:27CF6981236D3E30093A1C541405784F137A98BE7992FC42E437B8BC1E69B32654B4DC4D746EF2FE55B550C899E34A99A165C364809914A0139A047DE6187D45
                                                                              Malicious:false
                                                                              Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:Extensible storage user DataBase, version 0x620, checksum 0xbe739778, page size 16384, Windows version 10.0
                                                                              Category:dropped
                                                                              Size (bytes):1310720
                                                                              Entropy (8bit):0.6290337685825674
                                                                              Encrypted:false
                                                                              SSDEEP:1536:XSB2ESB2SSjlK/HZH03N9Jdt8gYkr3g16l2UPkLk+kDWyrufTRryrUOLUzCJ:Xaza9iJa+2UtmOQOL
                                                                              MD5:7C85604DF10B1C889D5412F0F9BD0408
                                                                              SHA1:73347D06FA5F9805FD242F900EA4E4ADF9390239
                                                                              SHA-256:BFFD6D1A55C541DB462A5DC65E3AFB3F698051988A994753B524AE5DC47DC288
                                                                              SHA-512:31E23DEFDA78AAA372A0024C7FD1A3A6D616CC6974392B8A74F03F8DD2EC062B3DCE74D911FBEB1567A546C45B530DE807CCEDD27E8499C3014F88ECA1915F86
                                                                              Malicious:false
                                                                              Preview:.s.x... .......P.......X\...;...{......................0.j..........|S.0....|3.h.g..........|S.0.j.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{....................................c......|S.................W.t......|S..........................#......0.j.....................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):16384
                                                                              Entropy (8bit):0.07418305924315502
                                                                              Encrypted:false
                                                                              SSDEEP:3:N7lltOetYeikapZmlXxZ6Zd2Gsn/vGlzmrtZmlYllHol///lZMPCyH:NhltrzgCu2rygtYIpo5
                                                                              MD5:2C1292E3FA39979A195A217B12458DEC
                                                                              SHA1:290A092533E9F5DFFD5AAF5CFFBD0A26D7046162
                                                                              SHA-256:2BA51E58B38412505DB2B2162DB697E45CDD44D2F727D6E7F0C8728FB20C08A5
                                                                              SHA-512:163D1EF2AE26EEB21D92A51175472FCD70C79AE9E995EAB696A3ABDB7447951AA20F793D6D4AE9B40B0BBA89998385CE97C26055F3E7617F6AE8EEF4C265B830
                                                                              Malicious:false
                                                                              Preview:...M.....................................;...{..0....|3......|S..............|3......|S.{........|3.................W.t......|S.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\dMDImIGmc7.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):321
                                                                              Entropy (8bit):5.36509199858051
                                                                              Encrypted:false
                                                                              SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                              MD5:1CF2352B684EF57925D98E766BA897F2
                                                                              SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                              SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                              SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                              Malicious:true
                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):746
                                                                              Entropy (8bit):5.349174276064173
                                                                              Encrypted:false
                                                                              SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                              MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                              SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                              SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                              SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                              Malicious:false
                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                              Process:C:\Windows\SysWOW64\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                              Category:dropped
                                                                              Size (bytes):1088392
                                                                              Entropy (8bit):7.789940577622617
                                                                              Encrypted:false
                                                                              SSDEEP:24576:QUUGGHn+rUGemcPe9MpKL4Plb2sZWV+tLv0QYu5OPthT+gd:jGHpRPqMpvlqs0O4iO2k
                                                                              MD5:8A8767F589EA2F2C7496B63D8CCC2552
                                                                              SHA1:CC5DE8DD18E7117D8F2520A51EDB1D165CAE64B0
                                                                              SHA-256:0918D8AB2237368A5CEC8CE99261FB07A1A1BEEDA20464C0F91AF0FE3349636B
                                                                              SHA-512:518231213CA955ACDF37B4501FDE9C5B15806D4FC166950EB8706E8D3943947CF85324FAEE806D7DF828485597ECEFFCFA05CA1A5D8AB1BD51ED12DF963A1FE4
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):234
                                                                              Entropy (8bit):4.977464602412109
                                                                              Encrypted:false
                                                                              SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                              MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                              SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                              SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                              SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                              Malicious:false
                                                                              Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):49152
                                                                              Entropy (8bit):4.62694170304723
                                                                              Encrypted:false
                                                                              SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                              MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                              SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                              SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                              SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):36864
                                                                              Entropy (8bit):4.340550904466943
                                                                              Encrypted:false
                                                                              SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                              MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                              SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                              SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                              SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):57344
                                                                              Entropy (8bit):4.657268358041957
                                                                              Encrypted:false
                                                                              SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                              MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                              SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                              SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                              SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):176128
                                                                              Entropy (8bit):5.775360792482692
                                                                              Encrypted:false
                                                                              SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                              MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                              SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                              SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                              SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):548864
                                                                              Entropy (8bit):6.034211651049746
                                                                              Encrypted:false
                                                                              SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                              MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                              SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                              SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                              SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):11776
                                                                              Entropy (8bit):5.273875899788767
                                                                              Encrypted:false
                                                                              SSDEEP:192:V8/Qp6lCJuV3jHXtyVNamVNG1YZfCrMmbfHJ7kjvLjbuLd9NEFbM64:y/cBJaLXt2NaheUrMmb/FkjvLjbuZj64
                                                                              MD5:73A24164D8408254B77F3A2C57A22AB4
                                                                              SHA1:EA0215721F66A93D67019D11C4E588A547CC2AD6
                                                                              SHA-256:D727A640723D192AA3ECE213A173381682041CB28D8BD71781524DBAE3DDBF62
                                                                              SHA-512:650D4320D9246AAECD596AC8B540BF7612EC7A8F60ECAA6E9C27B547B751386222AB926D0C915698D0BB20556475DA507895981C072852804F0B42FDDA02B844
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&...........E... ...`....... ..............................D9....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...4%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                              Process:C:\Windows\SysWOW64\rundll32.exe
                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1721856
                                                                              Entropy (8bit):6.639085961200334
                                                                              Encrypted:false
                                                                              SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                              MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                              SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                              SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                              SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                              Process:C:\Users\user\Desktop\dMDImIGmc7.exe
                                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {725BED6F-EB1D-3595-B4AC-1BF7669F9138}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                              Category:dropped
                                                                              Size (bytes):8241152
                                                                              Entropy (8bit):7.950608160690967
                                                                              Encrypted:false
                                                                              SSDEEP:98304:VwJ4t1h0cG5FGJRPxow8OnwJ4t1h0cG5hwJ4t1h0cG5PwJ4t1h0cG5:iWh0cGwGWh0cGkWh0cGGWh0cG
                                                                              MD5:77EA6CC6A1013CE59E66ECDF09C13845
                                                                              SHA1:17B286CCFF817907203F7013049275DA81DCA61B
                                                                              SHA-256:2F11F7F897028602F3DF0AC4767D62A94BA53BDF6642625E37D3386166F3DE9E
                                                                              SHA-512:1B62824AB7F7CBA5136CDC84D2268C331D7BB13A6D645E7463665BC299450AE6C349ECDB6CECB51B2FD99D3A88702B5C2D9E5C4942F49DD444BAF2875126A33F
                                                                              Malicious:false
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {725BED6F-EB1D-3595-B4AC-1BF7669F9138}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                              Category:dropped
                                                                              Size (bytes):8241152
                                                                              Entropy (8bit):7.950608160690967
                                                                              Encrypted:false
                                                                              SSDEEP:98304:VwJ4t1h0cG5FGJRPxow8OnwJ4t1h0cG5hwJ4t1h0cG5PwJ4t1h0cG5:iWh0cGwGWh0cGkWh0cGGWh0cG
                                                                              MD5:77EA6CC6A1013CE59E66ECDF09C13845
                                                                              SHA1:17B286CCFF817907203F7013049275DA81DCA61B
                                                                              SHA-256:2F11F7F897028602F3DF0AC4767D62A94BA53BDF6642625E37D3386166F3DE9E
                                                                              SHA-512:1B62824AB7F7CBA5136CDC84D2268C331D7BB13A6D645E7463665BC299450AE6C349ECDB6CECB51B2FD99D3A88702B5C2D9E5C4942F49DD444BAF2875126A33F
                                                                              Malicious:false
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {725BED6F-EB1D-3595-B4AC-1BF7669F9138}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                              Category:dropped
                                                                              Size (bytes):8241152
                                                                              Entropy (8bit):7.950608160690967
                                                                              Encrypted:false
                                                                              SSDEEP:98304:VwJ4t1h0cG5FGJRPxow8OnwJ4t1h0cG5hwJ4t1h0cG5PwJ4t1h0cG5:iWh0cGwGWh0cGkWh0cGGWh0cG
                                                                              MD5:77EA6CC6A1013CE59E66ECDF09C13845
                                                                              SHA1:17B286CCFF817907203F7013049275DA81DCA61B
                                                                              SHA-256:2F11F7F897028602F3DF0AC4767D62A94BA53BDF6642625E37D3386166F3DE9E
                                                                              SHA-512:1B62824AB7F7CBA5136CDC84D2268C331D7BB13A6D645E7463665BC299450AE6C349ECDB6CECB51B2FD99D3A88702B5C2D9E5C4942F49DD444BAF2875126A33F
                                                                              Malicious:false
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):423498
                                                                              Entropy (8bit):6.57796178200668
                                                                              Encrypted:false
                                                                              SSDEEP:6144:euH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvJ:euH2anwohwQUv5uH2anwohwQUvJ
                                                                              MD5:896F0B692FB1985AF54240721CA871E5
                                                                              SHA1:8FFE5ED5C1C40B1B518D4A0D8B04B368FB0B017A
                                                                              SHA-256:58BEBD6DBFD73A488BD99A8B7779327CC1A9EFF85E6368ED49FAC52B459328C5
                                                                              SHA-512:DBFECCA3E3D8BB49A6EF94AB9A920A9BAB8B389C58E3A35B27BE65829D0608E23DDE73DC331497A1929656794A2C71134D335DF5C6825F8917DC3C961C05520C
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI996E.tmp, Author: Joe Security
                                                                              Preview:...@IXOS.@.....@uI.Y.@.....@.....@.....@.....@.....@......&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}'.ScreenConnect Client (65d97bc8a263f920)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{725BED6F-EB1D-3595-B4AC-1BF7669F9138}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (65d97bc8a263f920)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{91803B2D-BCE4-4D75-2001-714374EA8E7A}^.C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{BCD3735B-7A0B-F604-901A-84A4EB8DB724}f.C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{B65B3FD6-55AB-3FB4-4975-FA5784A90593}c.C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsFileMa
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):207360
                                                                              Entropy (8bit):6.573348437503042
                                                                              Encrypted:false
                                                                              SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                              MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                              SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                              SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                              SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):207360
                                                                              Entropy (8bit):6.573348437503042
                                                                              Encrypted:false
                                                                              SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                              MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                              SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                              SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                              SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):20480
                                                                              Entropy (8bit):1.1717934634328306
                                                                              Encrypted:false
                                                                              SSDEEP:12:JSbX72FjiQAGiLIlHVRpIh/7777777777777777777777777vDHFBz5CmtFd7rlN:JvQI5wPAwkF
                                                                              MD5:73D1B7A21A6407A3631E953F81923383
                                                                              SHA1:B0E599E6361F80067AC17E3E8CFD3CBD54314B7E
                                                                              SHA-256:8E99CA38DE5317757DA26ACF044F805C09025E437CBD4223A04D790D3E71B430
                                                                              SHA-512:BAA23DC9165D4C32F4AB27379C7EAD94A91768A76C489C7637A067A08D3D6D1A1263123DBA846821DCC0DCEC0D1E55DF9198185F69906E72748A4FB79785ADFB
                                                                              Malicious:false
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):20480
                                                                              Entropy (8bit):1.8073992753804864
                                                                              Encrypted:false
                                                                              SSDEEP:48:h8PhpuRc06WXzEnT5PEORZqcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrGAn:8hp15nTRFkpofdYdZgFicGe
                                                                              MD5:4E2AD1F6FD65A975A69458D62EEAD8F6
                                                                              SHA1:07E2E1A5466BEFD0800EB337692A475BA9723E22
                                                                              SHA-256:2CD05D135B0304613251CA9E043E7AB226865773ED4DD18D3AD7BBB0B935263C
                                                                              SHA-512:E1EAFCE31D63D3B5B6A3895BA1D5C24E8AE7B4030B3172DF74A84EF9D0C49A43D88DBAA07799EC1045E65B846F18DAD1B4FDAE22730C73D3F59B673E2378D838
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                              Category:dropped
                                                                              Size (bytes):435
                                                                              Entropy (8bit):5.289734780210945
                                                                              Encrypted:false
                                                                              SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                              MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                              SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                              SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                              SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                              Malicious:false
                                                                              Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):360001
                                                                              Entropy (8bit):5.36298304344965
                                                                              Encrypted:false
                                                                              SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaud:zTtbmkExhMJCIpEU
                                                                              MD5:49F4F567C79D563DCFDA1405EB905728
                                                                              SHA1:3508BD3DFCDBE6615180ABBA8DE9C063CD2FDAC1
                                                                              SHA-256:97116824209DED274C9E145041A8710177814E0BD5367EE42C1F28E4443E14DD
                                                                              SHA-512:F730035AB72B772476EF2E83C5BAB66F46083D18C27184CCECBF906ECEE6E7BCE3FAFA1D6F33B0EADB25696D18B6EE1F676F32BAFB4A13BE4CD8A06D56AE828B
                                                                              Malicious:false
                                                                              Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                              Process:C:\Windows\System32\svchost.exe
                                                                              File Type:JSON data
                                                                              Category:dropped
                                                                              Size (bytes):55
                                                                              Entropy (8bit):4.306461250274409
                                                                              Encrypted:false
                                                                              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                              MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                              Malicious:false
                                                                              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.049751616937269
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+WRQv/vXbAa3xT:2dL9hK6E46YPRNaWQ3vH
                                                                              MD5:C6FAD2D6F81702AAAF2B86FD9C7F5EBC
                                                                              SHA1:0D122B01051B572CDBBEEC2AA1E1677A7D3D6A55
                                                                              SHA-256:9D9D684215F90BD26D05FC36A9E7A774726533B39C377DEEEF7A356B0D2CF122
                                                                              SHA-512:D1679D2220DCBCCB47D9AFABA53DD192740DB95324C354B5654CC624151E2154B2B09F18568BA945309B898615349AECC6A646AE27FCE32C5BF70C4A686FDF8C
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a12%3a35</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.050100755727832
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+x5/vXbAa3xT:2dL9hK6E46YPRNaFRvH
                                                                              MD5:092120398E26A542007FF1BA1EBEAEE8
                                                                              SHA1:2F4628206328F71F194387E8317622258B7BF977
                                                                              SHA-256:503D5ACA9B4681E455A04CD550A8B836F5E50FBABA20CC7BA73A9FCF37EFAFEA
                                                                              SHA-512:5894887BAA109697EBE6A41D3B175483F06EB9DED7A76123AD23A3D0A075C63D54CD263362B5D2F5527A88B0F2DBD5969DE07DBC5125F9DC2DDA671A35CA60E9
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a11%3a56</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.047901761695051
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+D/vXbAa3xT:2dL9hK6E46YPRNanvH
                                                                              MD5:2DEBBD46959FDD0F5D2BE36FECD19D8E
                                                                              SHA1:E2BF0D55F2A8CF728A3F0161E8F59E406FB8822E
                                                                              SHA-256:A2DAAAB036C5D5DA2F5CC5F9E588CC8F522DE0A3B761E47767BC3780E8889A24
                                                                              SHA-512:5847B8BF71AC0A527CBEF852126622582B26135790F8A2E29C092996979E19A565CA83A48CCFF26863F0688F82F9313F1040AF87F09953D40A5FA403C3BB23C6
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a11%3a52</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.046676098193585
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+sz/vXbAa3xT:2dL9hK6E46YPRNaIrvH
                                                                              MD5:7B5F8CC73A3670749B9C3EC35311AD80
                                                                              SHA1:1B4C79090EF5D8A0DC7CA81AAB4244977F8E5FA8
                                                                              SHA-256:DC8C06BBEFB0BB1FB0C9CF2A902A8A14CBE7ACA65BEAAE4B468B0B902081750D
                                                                              SHA-512:1091C7D49DCB225700D44C16A842F23B443BBCFD750B91BD925CE37CC7463CD67CC7242689B0CA0CDF7FECF45EB1F7504AED97FB6A03495E21C1E62DE7E685D4
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a14%3a41</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.046641545891407
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+WVI/vXbAa3xT:2dL9hK6E46YPRNaO+vH
                                                                              MD5:A12D99CE47CFBACAC226E90476B9A4B9
                                                                              SHA1:A44940FE1C8B333DF1F22ABD24367B8F6280D18A
                                                                              SHA-256:B71783120C287ACE0EC340996070B5BBD0C0A88686FE96192CF355A4192A7FD3
                                                                              SHA-512:DC423714275E4F283454A20C4758171F0418886F6D426EE3C65A15C37431931FE1A0C889BFC7AE24089423A3BF2A8A10DFEDF03D0F3E27E25E0440080130E82C
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a12%3a04</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.04940491333645
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+b/vXbAa3xT:2dL9hK6E46YPRNaPvH
                                                                              MD5:1E506F659ACB51E4D7510F23371C0571
                                                                              SHA1:098B987F6EC947275697A84BB845623EA648272B
                                                                              SHA-256:E41B9539973928C1DB8CAD7F881203453BB7EB58FEA371C875804501B39A1148
                                                                              SHA-512:8624D1375CEFACF9B78D67C33CB900FDD2B7BA6CBDB369096A5A2F91CDF4D50EABEDEB32E3F1E10248DDB49BE476BAEF54D753FF269BB1B86B1A7C01C094B28C
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a11%3a49</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.047901761695051
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+Wn/vXbAa3xT:2dL9hK6E46YPRNa4vH
                                                                              MD5:2ED60F2FD177D257C13D3081972810A4
                                                                              SHA1:53EFE0B55E3EB7B7414FF03CD812F94397A960FC
                                                                              SHA-256:AF56926B717A6AE8A98473AF0848E2127617C4D0D49DF54A77C4D7CE2DA9B80F
                                                                              SHA-512:1488EB9AF62CC0159E47F6DEC94A30233FC749A7DF95D9C5097C9C6FE8DF4808B7507227A43E32533D1E5A422836DB193F7B8E199024E7524DC5D451BF094092
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a12%3a16</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.05166842426392
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+Pw/vXbAa3xT:2dL9hK6E46YPRNayvH
                                                                              MD5:0909593406B7E96945910B0790F2C8B0
                                                                              SHA1:F2751E1BD4FD245C287E84002AFBD200E8515D79
                                                                              SHA-256:19AFAB76340D93E6547E414D3B5B5B14169A4E9731E4262236ABD275F0B7AC05
                                                                              SHA-512:DC4A31506DD60CEF0C99C0C85DEE3800CD8B9689F2C42A6F708E0AE9C8C85543F1A45C49045D3CF7C2375B16C08B40AFE51AAB147CFF15E80136D0C7BFE63BE5
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a13%3a39</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.048565486973996
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+eev/vXbAa3xT:2dL9hK6E46YPRNaT3vH
                                                                              MD5:26C263E7872EBBAC313F20039F657097
                                                                              SHA1:EE6E66F77F6B85FD6783D0785F4E11598E9B3738
                                                                              SHA-256:2081FDCEC2CB76A617ACE51D941F7E9C7364BC99E4DA2FBDBD5EB03DCF24DEEF
                                                                              SHA-512:5E136B509C8FE4569290273F6BD78C4AC0DAED89D0AC2A184C1BECE04B24935104644A772CD3C107749E883C6144FD1982E245E3A63D5A0751E9ABC0E745B9B1
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a11%3a45</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.048216348183435
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+LI/vXbAa3xT:2dL9hK6E46YPRNa+vH
                                                                              MD5:B299B8ED538E43281D1BCD28BCE50F44
                                                                              SHA1:D7CEA4B3A2A4B12B4C7E1AF3E0462B2A2F763D69
                                                                              SHA-256:332BF4EB7C627B1ED316B92F7529875CAE50807306405DAEB5E3974A1C0E9CCF
                                                                              SHA-512:611B1671B9DEEC75E431D532E6C67CB312C28B9A0F14686BDE2C244177AAEF1D14B1DB1E59A476CEFB93D2D4703D5B5520885AA2931F56279729AFB3063FDBBE
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a13%3a04</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):584
                                                                              Entropy (8bit):5.048565486973996
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlqEaG+eev/vXbAa3xT:2dL9hK6E46YPRNaT3vH
                                                                              MD5:26C263E7872EBBAC313F20039F657097
                                                                              SHA1:EE6E66F77F6B85FD6783D0785F4E11598E9B3738
                                                                              SHA-256:2081FDCEC2CB76A617ACE51D941F7E9C7364BC99E4DA2FBDBD5EB03DCF24DEEF
                                                                              SHA-512:5E136B509C8FE4569290273F6BD78C4AC0DAED89D0AC2A184C1BECE04B24935104644A772CD3C107749E883C6144FD1982E245E3A63D5A0751E9ABC0E745B9B1
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-jqk235-relay.screenconnect.com=147.28.146.16-10%2f12%2f2024%2014%3a11%3a45</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):32768
                                                                              Entropy (8bit):1.4253862021504196
                                                                              Encrypted:false
                                                                              SSDEEP:48:74Ruqvh8FXzbT5aUCEORZqcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrGAdF:sR6VTo9FkpofdYdZgFicGe
                                                                              MD5:5D32A42C749FBCC5E85D8D610B1C199F
                                                                              SHA1:C2112B884E116C1C0080042CE31E74BC73638793
                                                                              SHA-256:18117E37F17A9F2F18B27E64158903B5A8BD945627835A6A061F8D1A0EAB0BA0
                                                                              SHA-512:B77C19DB14976AF7CFAC12C27636CE59DFDB61B53E47F8F13BBE3FCBFA43ADBF7D0A859872DF1DCB6B9D72ED029724270ECDB40D0D519327E20F4EBF01A50C5A
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF015EEA789F94F6E5.TMP, Author: Joe Security
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):32768
                                                                              Entropy (8bit):1.4253862021504196
                                                                              Encrypted:false
                                                                              SSDEEP:48:74Ruqvh8FXzbT5aUCEORZqcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrGAdF:sR6VTo9FkpofdYdZgFicGe
                                                                              MD5:5D32A42C749FBCC5E85D8D610B1C199F
                                                                              SHA1:C2112B884E116C1C0080042CE31E74BC73638793
                                                                              SHA-256:18117E37F17A9F2F18B27E64158903B5A8BD945627835A6A061F8D1A0EAB0BA0
                                                                              SHA-512:B77C19DB14976AF7CFAC12C27636CE59DFDB61B53E47F8F13BBE3FCBFA43ADBF7D0A859872DF1DCB6B9D72ED029724270ECDB40D0D519327E20F4EBF01A50C5A
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF12B3ED92C5317D98.TMP, Author: Joe Security
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):512
                                                                              Entropy (8bit):0.0
                                                                              Encrypted:false
                                                                              SSDEEP:3::
                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                              Malicious:false
                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):512
                                                                              Entropy (8bit):0.0
                                                                              Encrypted:false
                                                                              SSDEEP:3::
                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                              Malicious:false
                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):512
                                                                              Entropy (8bit):0.0
                                                                              Encrypted:false
                                                                              SSDEEP:3::
                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                              Malicious:false
                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):512
                                                                              Entropy (8bit):0.0
                                                                              Encrypted:false
                                                                              SSDEEP:3::
                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                              Malicious:false
                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):32768
                                                                              Entropy (8bit):0.07728883712617902
                                                                              Encrypted:false
                                                                              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOBz5CTqtJS4zASKChiVky6l51:2F0i8n0itFzDHFBz5CmtFd7r
                                                                              MD5:390CAC7A4D0B0DA3E5028952BC5302AC
                                                                              SHA1:2EA1A7763210D8BCC550447822443109B79184EE
                                                                              SHA-256:93B79C64580A28E94FF307C426A3125368DC4AE41ABE270AD1A8F834A3B0A752
                                                                              SHA-512:61C71628E3A1C6288E5AECA925D6ED7F188B21D7B48EC519874EE6E93561018C4B5877FFE12F50A32734385D95F806A30EF9D881FCC6CC7328C9BEAD65069178
                                                                              Malicious:false
                                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):20480
                                                                              Entropy (8bit):1.8073992753804864
                                                                              Encrypted:false
                                                                              SSDEEP:48:h8PhpuRc06WXzEnT5PEORZqcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrGAn:8hp15nTRFkpofdYdZgFicGe
                                                                              MD5:4E2AD1F6FD65A975A69458D62EEAD8F6
                                                                              SHA1:07E2E1A5466BEFD0800EB337692A475BA9723E22
                                                                              SHA-256:2CD05D135B0304613251CA9E043E7AB226865773ED4DD18D3AD7BBB0B935263C
                                                                              SHA-512:E1EAFCE31D63D3B5B6A3895BA1D5C24E8AE7B4030B3172DF74A84EF9D0C49A43D88DBAA07799EC1045E65B846F18DAD1B4FDAE22730C73D3F59B673E2378D838
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF7C2EBFC6BD78F3C5.TMP, Author: Joe Security
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):512
                                                                              Entropy (8bit):0.0
                                                                              Encrypted:false
                                                                              SSDEEP:3::
                                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                              Malicious:false
                                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):32768
                                                                              Entropy (8bit):1.4253862021504196
                                                                              Encrypted:false
                                                                              SSDEEP:48:74Ruqvh8FXzbT5aUCEORZqcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrGAdF:sR6VTo9FkpofdYdZgFicGe
                                                                              MD5:5D32A42C749FBCC5E85D8D610B1C199F
                                                                              SHA1:C2112B884E116C1C0080042CE31E74BC73638793
                                                                              SHA-256:18117E37F17A9F2F18B27E64158903B5A8BD945627835A6A061F8D1A0EAB0BA0
                                                                              SHA-512:B77C19DB14976AF7CFAC12C27636CE59DFDB61B53E47F8F13BBE3FCBFA43ADBF7D0A859872DF1DCB6B9D72ED029724270ECDB40D0D519327E20F4EBF01A50C5A
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFDC8B2D8878F33546.TMP, Author: Joe Security
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):69632
                                                                              Entropy (8bit):0.2371944243464057
                                                                              Encrypted:false
                                                                              SSDEEP:48:w3DBAdu9S3qcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrOHO+:sxpofdYdZgFicGOv
                                                                              MD5:02E4BC829619CCD4D1BC09A2BA7DE7DC
                                                                              SHA1:F7D782F21FC63445F464B9500D88650687B1F7D3
                                                                              SHA-256:B5F4FB526E23F6315B61F91BDACDCFDFC83B8C156C7C29A46E3DB8D612A618D8
                                                                              SHA-512:98C80119EDEC791C5CDDD67D83AF889B8EB7CF5AD3FDBA4E4436EBFD7E84306EEC025BEA5EDDB82741C821D08CF33460B613686DEEA2F25C1E8976CD618AB313
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFE465DACC87925B32.TMP, Author: Joe Security
                                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\msiexec.exe
                                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                                              Category:dropped
                                                                              Size (bytes):20480
                                                                              Entropy (8bit):1.8073992753804864
                                                                              Encrypted:false
                                                                              SSDEEP:48:h8PhpuRc06WXzEnT5PEORZqcq56Adu9SijZoddaxkUqUZ/SoTeiprT4JaGHLrGAn:8hp15nTRFkpofdYdZgFicGe
                                                                              MD5:4E2AD1F6FD65A975A69458D62EEAD8F6
                                                                              SHA1:07E2E1A5466BEFD0800EB337692A475BA9723E22
                                                                              SHA-256:2CD05D135B0304613251CA9E043E7AB226865773ED4DD18D3AD7BBB0B935263C
                                                                              SHA-512:E1EAFCE31D63D3B5B6A3895BA1D5C24E8AE7B4030B3172DF74A84EF9D0C49A43D88DBAA07799EC1045E65B846F18DAD1B4FDAE22730C73D3F59B673E2378D838
                                                                              Malicious:false
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFE8021363BD46873C.TMP, Author: Joe Security
                                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):7.429445154057834
                                                                              TrID:
                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                              • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:dMDImIGmc7.exe
                                                                              File size:5'620'136 bytes
                                                                              MD5:4221ca1a9f9f6e0c9b9ddd58e2c2f863
                                                                              SHA1:812eda18b362a8f6cdc7aad46967fba7782427d2
                                                                              SHA256:26f77cea3328a827696420e271580cbe41d957e57e0e6411054fd0e565396085
                                                                              SHA512:80dc113d8ea89a403c7d68668a935821d79b0002e96f5ea4d3bb9f365035f4818dad047364c7b237b0c1a152a178483299d68dd41ea379daa1ffb8396014cb70
                                                                              SSDEEP:49152:0EEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:9Es6efPNwJ4t1h0cG5FGJRPxow8O
                                                                              TLSH:B346E111B3DA95B9D4BF063CD87A82699A74BC044712C7EF53D4BD2D2D32BC05A323A6
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                              Icon Hash:00928e8e8686b000
                                                                              Entrypoint:0x4014ad
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:true
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:5
                                                                              OS Version Minor:1
                                                                              File Version Major:5
                                                                              File Version Minor:1
                                                                              Subsystem Version Major:5
                                                                              Subsystem Version Minor:1
                                                                              Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                              Signature Valid:true
                                                                              Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                              Signature Validation Error:The operation completed successfully
                                                                              Error Number:0
                                                                              Not Before, Not After
                                                                              • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                              Subject Chain
                                                                              • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                              Version:3
                                                                              Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                              Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                              Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                              Serial:0B9360051BCCF66642998998D5BA97CE
                                                                              Instruction
                                                                              call 00007FA6CCB7D3BAh
                                                                              jmp 00007FA6CCB7CE6Fh
                                                                              push ebp
                                                                              mov ebp, esp
                                                                              push 00000000h
                                                                              call dword ptr [0040D040h]
                                                                              push dword ptr [ebp+08h]
                                                                              call dword ptr [0040D03Ch]
                                                                              push C0000409h
                                                                              call dword ptr [0040D044h]
                                                                              push eax
                                                                              call dword ptr [0040D048h]
                                                                              pop ebp
                                                                              ret
                                                                              push ebp
                                                                              mov ebp, esp
                                                                              sub esp, 00000324h
                                                                              push 00000017h
                                                                              call dword ptr [0040D04Ch]
                                                                              test eax, eax
                                                                              je 00007FA6CCB7CFF7h
                                                                              push 00000002h
                                                                              pop ecx
                                                                              int 29h
                                                                              mov dword ptr [004148D8h], eax
                                                                              mov dword ptr [004148D4h], ecx
                                                                              mov dword ptr [004148D0h], edx
                                                                              mov dword ptr [004148CCh], ebx
                                                                              mov dword ptr [004148C8h], esi
                                                                              mov dword ptr [004148C4h], edi
                                                                              mov word ptr [004148F0h], ss
                                                                              mov word ptr [004148E4h], cs
                                                                              mov word ptr [004148C0h], ds
                                                                              mov word ptr [004148BCh], es
                                                                              mov word ptr [004148B8h], fs
                                                                              mov word ptr [004148B4h], gs
                                                                              pushfd
                                                                              pop dword ptr [004148E8h]
                                                                              mov eax, dword ptr [ebp+00h]
                                                                              mov dword ptr [004148DCh], eax
                                                                              mov eax, dword ptr [ebp+04h]
                                                                              mov dword ptr [004148E0h], eax
                                                                              lea eax, dword ptr [ebp+08h]
                                                                              mov dword ptr [004148ECh], eax
                                                                              mov eax, dword ptr [ebp-00000324h]
                                                                              mov dword ptr [00414828h], 00010001h
                                                                              Programming Language:
                                                                              • [IMP] VS2008 SP1 build 30729
                                                                              • [IMP] VS2008 build 21022
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533074.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x15fa8
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0x160000x5330740x533200d813d73373778ed5b0a4b71b252379ebunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              FILES0x163d40x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3962220149253731
                                                                              FILES0x9c3d40x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111589431762695
                                                                              FILES0x2409d40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415066442757009
                                                                              FILES0x25b5d40x2ec318PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9810924530029297
                                                                              FILES0x5478ec0x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                              RT_MANIFEST0x548eec0x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                              DLLImport
                                                                              mscoree.dllCorBindToRuntimeEx
                                                                              KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                              OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishUnited States
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 10, 2024 15:11:46.082143068 CET49724443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:46.082180977 CET44349724147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:46.082391977 CET49724443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:47.505234957 CET49724443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:47.505275011 CET44349724147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:47.505331993 CET44349724147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:49.881968975 CET49736443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:49.882013083 CET44349736147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:49.882078886 CET49736443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:49.885557890 CET49736443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:49.885574102 CET44349736147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:49.885623932 CET44349736147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:53.297219038 CET49750443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:53.297269106 CET44349750147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:53.297421932 CET49750443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:53.299591064 CET49750443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:53.299607992 CET44349750147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:53.299678087 CET44349750147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:57.838790894 CET49767443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:57.838826895 CET44349767147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:57.838895082 CET49767443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:57.840924025 CET49767443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:11:57.840940952 CET44349767147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:11:57.841000080 CET44349767147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:05.372934103 CET49790443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:05.372980118 CET44349790147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:05.373066902 CET49790443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:05.375744104 CET49790443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:05.375762939 CET44349790147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:05.375818968 CET44349790147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:17.299036980 CET49822443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:17.299078941 CET44349822147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:17.299174070 CET49822443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:17.301881075 CET49822443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:17.301899910 CET44349822147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:17.301953077 CET44349822147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:36.451358080 CET49873443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:36.451397896 CET44349873147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:36.451479912 CET49873443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:36.453680992 CET49873443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:12:36.453691959 CET44349873147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:12:36.453747034 CET44349873147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:13:05.479743958 CET49940443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:13:05.479782104 CET44349940147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:13:05.479887962 CET49940443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:13:05.482899904 CET49940443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:13:05.482914925 CET44349940147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:13:05.482955933 CET44349940147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:13:40.783463955 CET50020443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:13:40.783519983 CET44350020147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:13:40.787619114 CET50020443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:13:40.790206909 CET50020443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:13:40.790225983 CET44350020147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:13:40.790285110 CET44350020147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:14:42.801502943 CET50026443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:14:42.801552057 CET44350026147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:14:42.801623106 CET50026443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:14:42.804805040 CET50026443192.168.2.6147.28.146.16
                                                                              Dec 10, 2024 15:14:42.804820061 CET44350026147.28.146.16192.168.2.6
                                                                              Dec 10, 2024 15:14:42.804873943 CET44350026147.28.146.16192.168.2.6
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 10, 2024 15:11:45.576860905 CET5549153192.168.2.61.1.1.1
                                                                              Dec 10, 2024 15:11:45.915992975 CET53554911.1.1.1192.168.2.6
                                                                              Dec 10, 2024 15:12:16.953680038 CET5853053192.168.2.61.1.1.1
                                                                              Dec 10, 2024 15:12:17.287601948 CET53585301.1.1.1192.168.2.6
                                                                              Dec 10, 2024 15:13:05.140135050 CET5649653192.168.2.61.1.1.1
                                                                              Dec 10, 2024 15:13:05.468200922 CET53564961.1.1.1192.168.2.6
                                                                              Dec 10, 2024 15:13:40.406848907 CET5523153192.168.2.61.1.1.1
                                                                              Dec 10, 2024 15:13:40.749026060 CET53552311.1.1.1192.168.2.6
                                                                              Dec 10, 2024 15:14:42.480514050 CET6312753192.168.2.61.1.1.1
                                                                              Dec 10, 2024 15:14:42.788525105 CET53631271.1.1.1192.168.2.6
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 10, 2024 15:11:45.576860905 CET192.168.2.61.1.1.10xf847Standard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:12:16.953680038 CET192.168.2.61.1.1.10x181eStandard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:13:05.140135050 CET192.168.2.61.1.1.10x7ea0Standard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:13:40.406848907 CET192.168.2.61.1.1.10x2465Standard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:14:42.480514050 CET192.168.2.61.1.1.10x5de1Standard query (0)instance-jqk235-relay.screenconnect.comA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 10, 2024 15:11:34.687468052 CET1.1.1.1192.168.2.60x2fdeNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 10, 2024 15:11:34.687468052 CET1.1.1.1192.168.2.60x2fdeNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:11:45.915992975 CET1.1.1.1192.168.2.60xf847No error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 10, 2024 15:11:45.915992975 CET1.1.1.1192.168.2.60xf847No error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:12:17.287601948 CET1.1.1.1192.168.2.60x181eNo error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 10, 2024 15:12:17.287601948 CET1.1.1.1192.168.2.60x181eNo error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:13:05.468200922 CET1.1.1.1192.168.2.60x7ea0No error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 10, 2024 15:13:05.468200922 CET1.1.1.1192.168.2.60x7ea0No error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:13:40.749026060 CET1.1.1.1192.168.2.60x2465No error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 10, 2024 15:13:40.749026060 CET1.1.1.1192.168.2.60x2465No error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false
                                                                              Dec 10, 2024 15:14:42.788525105 CET1.1.1.1192.168.2.60x5de1No error (0)instance-jqk235-relay.screenconnect.comserver-nix0992c762-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 10, 2024 15:14:42.788525105 CET1.1.1.1192.168.2.60x5de1No error (0)server-nix0992c762-relay.screenconnect.com147.28.146.16A (IP address)IN (0x0001)false

                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:09:11:37
                                                                              Start date:10/12/2024
                                                                              Path:C:\Users\user\Desktop\dMDImIGmc7.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\dMDImIGmc7.exe"
                                                                              Imagebase:0xa40000
                                                                              File size:5'620'136 bytes
                                                                              MD5 hash:4221CA1A9F9F6E0C9B9DDD58E2C2F863
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.2220093933.0000000005900000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.2162998319.0000000000A56000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:09:11:38
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\65d97bc8a263f920\ScreenConnect.ClientSetup.msi"
                                                                              Imagebase:0xf80000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:3
                                                                              Start time:09:11:38
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\System32\msiexec.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\msiexec.exe /V
                                                                              Imagebase:0x7ff6000b0000
                                                                              File size:69'632 bytes
                                                                              MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Target ID:4
                                                                              Start time:09:11:40
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding D3E1898133ED9999B5435F45ED30FB35 C
                                                                              Imagebase:0xf80000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:5
                                                                              Start time:09:11:40
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9353.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6329359 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                              Imagebase:0x860000
                                                                              File size:61'440 bytes
                                                                              MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:6
                                                                              Start time:09:11:41
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 0884BA7819EE95392B8E2AF813B055D4
                                                                              Imagebase:0xf80000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:09:11:43
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding B1B23A5FAA1E60E409692560D2F5180C E Global\MSI0000
                                                                              Imagebase:0xf80000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:8
                                                                              Start time:09:11:43
                                                                              Start date:10/12/2024
                                                                              Path:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-jqk235-relay.screenconnect.com&p=443&s=56508de8-6680-487c-bf67-90da90fb8804&k=BgIAAACkAABSU0ExAAgAAAEAAQCFLxyDUrHErMIW7%2fDJMbN4kt%2bzYQUFMZ9tDKD6IUwHL0tx7eqyJVjWqCK9BBNLXrevgy0D%2bI2HGKWEuCuCVgZyHKiyGple75sBfOIHLuuNwnXGE4Hut7fYAQZpMwhbg9WJHkinWnz48oYTj3WDlNWvm1aGLpzoSvMc81LgzImK2F20l3ytsR71eUDyFF4mJUECdzdunsS38hqmNM9k2oYgsqMvI6d5MBNbLfu5YieI3306j9iigaLVfMuj%2b6%2fQmDfYm1dlm1qc2Ut2gM%2b79f1E4WQ7Hn0vtxrxKVJ2NhEXC9T8vzMOEQ9p2CGSIzlqJqMZSUb1Gud9kBjFEwGMViDE"
                                                                              Imagebase:0x4a0000
                                                                              File size:95'512 bytes
                                                                              MD5 hash:75B21D04C69128A7230A0998086B61AA
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 0%, ReversingLabs
                                                                              Reputation:moderate
                                                                              Has exited:false

                                                                              Target ID:9
                                                                              Start time:09:11:44
                                                                              Start date:10/12/2024
                                                                              Path:C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe" "RunRole" "e948cbc7-54e9-45ff-a001-4f3f5173abca" "User"
                                                                              Imagebase:0xe00000
                                                                              File size:602'392 bytes
                                                                              MD5 hash:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.2237871096.0000000000E02000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.4030878089.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (65d97bc8a263f920)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                              Antivirus matches:
                                                                              • Detection: 0%, ReversingLabs
                                                                              Reputation:moderate
                                                                              Has exited:false

                                                                              Target ID:10
                                                                              Start time:09:11:47
                                                                              Start date:10/12/2024
                                                                              Path:C:\Windows\System32\svchost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                              Imagebase:0x7ff7403e0000
                                                                              File size:55'320 bytes
                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:15%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:20%
                                                                                Total number of Nodes:25
                                                                                Total number of Limit Nodes:1
                                                                                execution_graph 27539 14618d8 27540 14618e8 27539->27540 27543 14619e0 27540->27543 27541 1461935 27544 14619fb 27543->27544 27547 14641e0 27543->27547 27552 14641f0 27543->27552 27544->27541 27548 146420f 27547->27548 27549 14643ed 27548->27549 27557 58714b0 27548->27557 27561 58714c0 27548->27561 27553 146420f 27552->27553 27554 14643ed 27553->27554 27555 58714b0 RtlGetVersion 27553->27555 27556 58714c0 RtlGetVersion 27553->27556 27555->27554 27556->27554 27558 58714c0 27557->27558 27559 58714d4 27558->27559 27565 5872d07 27558->27565 27559->27549 27562 58714ce 27561->27562 27563 58714d4 27561->27563 27564 5872d07 RtlGetVersion 27562->27564 27563->27549 27564->27563 27566 5872d1d 27565->27566 27567 5872f0c RtlGetVersion 27566->27567 27568 5872e2c 27566->27568 27569 5872fca 27567->27569 27568->27559 27569->27559

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 60 58787b8-5878803 call 5873690 201 5878805 call 5879430 60->201 202 5878805 call 5874e40 60->202 203 5878805 call 58787a8 60->203 204 5878805 call 58787b8 60->204 64 587880b-587886d call 587a0d1 208 587886f call 587f455 64->208 209 587886f call 587f53e 64->209 70 5878875-58788df 211 58788e1 call 5892c81 70->211 212 58788e1 call 5892c90 70->212 76 58788e7-587892b 205 587892d call 5892c81 76->205 206 587892d call 5892c90 76->206 80 5878933-58789d4 87 5879425-58794c5 call 5874e40 call 5879b38 80->87 88 58789da-5878a0f 80->88 107 58794cb-5879514 87->107 88->87 91 5878a15-5878a4a 88->91 91->87 95 5878a50-5878a85 91->95 95->87 98 5878a8b-5878ac0 95->98 98->87 102 5878ac6-5878afb 98->102 102->87 106 5878b01-5878b1c 102->106 110 5878b22-5878b4e 106->110 111 5878bab-5878bbe 106->111 117 5878b50-5878b94 110->117 118 5878b9c-5878ba5 110->118 112 5878bd7-5878be6 111->112 113 5878bc0-5878bd5 111->113 114 5878bec-5878bf2 112->114 113->114 215 5878bf4 call 58949eb 114->215 216 5878bf4 call 589370f 114->216 117->118 118->110 118->111 119 5878bfa-5878c13 121 5878c15-5878c8c 119->121 122 5878c8e-5878cab 119->122 121->122 127 5878cad-5878cc2 121->127 124 5878cc8-5879013 122->124 173 58791ad-58791c9 124->173 174 5879019-5879191 124->174 127->124 176 58791d7-58791d8 173->176 177 58791cb 173->177 213 5879193 call 5894c81 174->213 214 5879193 call 5894c90 174->214 176->87 177->176 199 5879199-58791a7 199->173 199->174 201->64 202->64 203->64 204->64 205->80 206->80 208->70 209->70 211->76 212->76 213->199 214->199 215->119 216->119
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219686950.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5870000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID: 0-3916222277
                                                                                • Opcode ID: 2be6e3ea9d21aeff51976663eca540d1e315e4b0d5c7cf067becbb45ed958ccd
                                                                                • Instruction ID: 0a11ccfc617f865888e6f4be05d69dc88af2a6c8b04498f037111000512b4a83
                                                                                • Opcode Fuzzy Hash: 2be6e3ea9d21aeff51976663eca540d1e315e4b0d5c7cf067becbb45ed958ccd
                                                                                • Instruction Fuzzy Hash: 15626C34A10218DFDB19AF64C954BADBBB2FF89300F1085A9E909A7355CF71AD85CF80

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 217 58787a8-5878803 call 5873690 361 5878805 call 5879430 217->361 362 5878805 call 5874e40 217->362 363 5878805 call 58787a8 217->363 364 5878805 call 58787b8 217->364 222 587880b-587886d call 587a0d1 368 587886f call 587f455 222->368 369 587886f call 587f53e 222->369 228 5878875-58788df 371 58788e1 call 5892c81 228->371 372 58788e1 call 5892c90 228->372 234 58788e7-587892b 365 587892d call 5892c81 234->365 366 587892d call 5892c90 234->366 238 5878933-58789d4 245 5879425-58794c5 call 5874e40 call 5879b38 238->245 246 58789da-5878a0f 238->246 265 58794cb-5879514 245->265 246->245 249 5878a15-5878a4a 246->249 249->245 253 5878a50-5878a85 249->253 253->245 256 5878a8b-5878ac0 253->256 256->245 260 5878ac6-5878afb 256->260 260->245 264 5878b01-5878b1c 260->264 268 5878b22-5878b4e 264->268 269 5878bab-5878bbe 264->269 275 5878b50-5878b94 268->275 276 5878b9c-5878ba5 268->276 270 5878bd7-5878be6 269->270 271 5878bc0-5878bd5 269->271 272 5878bec-5878bf2 270->272 271->272 359 5878bf4 call 58949eb 272->359 360 5878bf4 call 589370f 272->360 275->276 276->268 276->269 277 5878bfa-5878c13 279 5878c15-5878c8c 277->279 280 5878c8e-5878cab 277->280 279->280 285 5878cad-5878cc2 279->285 282 5878cc8-5879013 280->282 331 58791ad-58791c9 282->331 332 5879019-5879191 282->332 285->282 334 58791d7-58791d8 331->334 335 58791cb 331->335 373 5879193 call 5894c81 332->373 374 5879193 call 5894c90 332->374 334->245 335->334 357 5879199-58791a7 357->331 357->332 359->277 360->277 361->222 362->222 363->222 364->222 365->238 366->238 368->228 369->228 371->234 372->234 373->357 374->357
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219686950.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5870000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID: 0-3916222277
                                                                                • Opcode ID: 22cab915a4d07b4b25dfcd7eae0a2080cc07385d5cec0b3dd8f80c9d836eba07
                                                                                • Instruction ID: 15ddf74773c733514ab84c890d52fa95af7848efc174b5ba0f3a3e1556e526f5
                                                                                • Opcode Fuzzy Hash: 22cab915a4d07b4b25dfcd7eae0a2080cc07385d5cec0b3dd8f80c9d836eba07
                                                                                • Instruction Fuzzy Hash: C2425E34A10218DFDB19AF64C954BADBBB2FF89300F148599E909A7356CF71AD81CF80

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 375 5872d07-5872de6 388 5872e58-5872e6d 375->388 389 5872de8-5872dfc 375->389 396 5872e6f-5872e8b 388->396 397 5872ead-5872ec8 388->397 392 5872e02 389->392 393 5872dfe-5872e00 389->393 394 5872e05-5872e26 call 5872560 392->394 393->394 406 5872e2c-5872e57 394->406 407 5872ef8-5872fc8 RtlGetVersion 394->407 409 5872e95-5872eab 396->409 410 5872e8d 396->410 403 5872eca-5872ece 397->403 404 5872ed0 403->404 405 5872ed9 403->405 404->405 405->407 417 5872fd1-5873014 407->417 418 5872fca-5872fd0 407->418 409->403 410->409 422 5873016 417->422 423 587301b-5873022 417->423 418->417 422->423
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219686950.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5870000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f6f181a7d4e12b27382badbbfbb54f4f90c1079ac3fb727da6d50f0f3b94fd86
                                                                                • Instruction ID: 3260ad0800d591a92a769175f2a11cc4e81635407d31e804f35d84c296b1e628
                                                                                • Opcode Fuzzy Hash: f6f181a7d4e12b27382badbbfbb54f4f90c1079ac3fb727da6d50f0f3b94fd86
                                                                                • Instruction Fuzzy Hash: 8C81F231A043698FEB11EB78D8247EEBFB2FF45600F04459AD946E7281DB749C49CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f5c02d868eec6c294a519b88966e02147692191dfe847e5d8b7930ab4df1b6a5
                                                                                • Instruction ID: a59827933fa2d14c1e089185abd8b7f633b9b9fcdb4e49f95ae8a408719d8c0b
                                                                                • Opcode Fuzzy Hash: f5c02d868eec6c294a519b88966e02147692191dfe847e5d8b7930ab4df1b6a5
                                                                                • Instruction Fuzzy Hash: EAB21A74A04205DFDB18DF68C888AADBBB2FF88314F558169E959EB361DB30EC41CB50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 714 587ba30-587bad2 call 587ba30 call 587b318 * 2 call 587a9b8 729 587bbb4-587bbbe 714->729 730 587bad8-587bada 714->730 731 587bae0-587bae6 730->731 732 587bbbf-587bc1f 730->732 733 587bc26-587bc5a 731->733 734 587baec-587bafe 731->734 732->733 742 587bc5c-587bcb0 733->742 739 587bb70-587bbae call 587b794 734->739 740 587bb00-587bb68 734->740 739->729 739->730 740->739 762 587bcb2-587bcc3 742->762 763 587bcc9-587bcca 742->763 762->763 763->742 764 587bccc-587bcdc 763->764 766 587bce4-587bcec 764->766 767 587bda0-587bda9 766->767 768 587bdb4-587bdbb 767->768 769 587bdab-587bdae 767->769 771 587bdc1-587be00 call 587b318 768->771 772 587bf9f-587bfa8 768->772 769->768 770 587bcf1-587bcfd 769->770 773 587bd03-587bd1c 770->773 774 587bfa9-587c01d 770->774 792 587be02-587be07 771->792 793 587be09-587be16 771->793 779 587bd93-587bd9d 773->779 780 587bd1e-587bd8b 773->780 801 587c023-587c042 774->801 802 587c1bd-587c1c7 774->802 779->767 780->779 796 587be19-587be56 call 587a9b8 792->796 793->796 806 587bf90-587bf99 796->806 807 587c044-587c0a3 call 587b318 801->807 808 587c0ab-587c0ba 801->808 806->772 809 587be5b-587be9a 806->809 807->808 808->802 813 587c0c0-587c0f9 808->813 824 587bf11-587bf66 809->824 825 587be9c-587bf09 809->825 813->802 826 587c0ff-587c102 813->826 824->806 841 587bf68-587bf6a 824->841 825->824 826->802 828 587c108-587c10b 826->828 831 587c10d-587c111 828->831 832 587c129-587c13b 828->832 833 587c113-587c117 831->833 834 587c11f-587c123 831->834 839 587c13d-587c1a0 832->839 840 587c1a8-587c1b7 832->840 833->834 834->832 835 587c1c8-587c20f 834->835 839->840 840->802 840->813 841->806 844 587bf6c-587bf8b 841->844 844->772 854 587bf8d 844->854 854->806
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219686950.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5870000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1f64e54162c0c86d206d0234ee7ba60ebda5130a900d25ee14dbfa5d4a61d9b2
                                                                                • Instruction ID: 05d04699cd8a59d3d920f232709d94cb394da1e8843b55c22d095e4bae1f15ec
                                                                                • Opcode Fuzzy Hash: 1f64e54162c0c86d206d0234ee7ba60ebda5130a900d25ee14dbfa5d4a61d9b2
                                                                                • Instruction Fuzzy Hash: 14426030A006099FDB18DF69C490AAEBBF2FF88314F148569E915EB751DB34ED46CB90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 1467a30-1467a7f 5 1467a81-1467a95 0->5 6 1467abd-1467ad5 0->6 11 1467a97 5->11 12 1467a9e-1467abb 5->12 9 1467ad7-1467aeb 6->9 10 1467b13-1467b2b 6->10 16 1467af4-1467b11 9->16 17 1467aed 9->17 18 1467b2d-1467b41 10->18 19 1467b69-1467b8e 10->19 11->12 12->6 16->10 17->16 24 1467b43 18->24 25 1467b4a-1467b67 18->25 29 1467b90-1467ba4 19->29 30 1467bcc-1467c05 19->30 24->25 25->19 34 1467ba6 29->34 35 1467bad-1467bca 29->35 41 1467c07-1467c1b 30->41 42 1467c43-1467c7c 30->42 34->35 35->30 45 1467c24-1467c41 41->45 46 1467c1d 41->46 52 1467c7e-1467c92 42->52 53 1467cba-1467cc9 42->53 45->42 46->45 56 1467c94 52->56 57 1467c9b-1467cb8 52->57 56->57 57->53
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: #!$K6$7
                                                                                • API String ID: 0-185628103
                                                                                • Opcode ID: aa43399248e6d625312ad909279f19aefda42dc578565c930edb01e0bc706152
                                                                                • Instruction ID: a95b5fbf8e5807a108b15a259641f56b2f485bedac78fbf0cf6044a611594a1a
                                                                                • Opcode Fuzzy Hash: aa43399248e6d625312ad909279f19aefda42dc578565c930edb01e0bc706152
                                                                                • Instruction Fuzzy Hash: 685191303202068BC70AAB7DD9A451E7BEBFFC9659354822AD515CB758EF74EC068B81

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 859 5898935-5898d6a call 5898914 872 5898d6c call 5898e00 859->872 873 5898d6c call 5898e10 859->873 864 5898d72-5898db0 869 5898dbb 864->869 870 5898db2 864->870 871 5898dbc 869->871 870->869 871->871 872->864 873->864
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 412e1138745da452161a7819f6763edce89ef23675a73649f6f58cf5e82eed4c
                                                                                • Instruction ID: 253155afeaf7a1923bdaef3fe64609609c1ac9ebba01cfa874ffa9d1265bb0f7
                                                                                • Opcode Fuzzy Hash: 412e1138745da452161a7819f6763edce89ef23675a73649f6f58cf5e82eed4c
                                                                                • Instruction Fuzzy Hash: E7118E75B04255CFCB09DB6CC468AA97BF2BF8A201B5400AAD902EB3A1DF359D45CB91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 874 5892c90-5892cf8 878 5892cfa 874->878 879 5892d61-5892d67 874->879 880 5892cfd-5892d03 878->880 961 5892d6a call 5892c81 879->961 962 5892d6a call 5892c90 879->962 882 5892d89-5892de8 880->882 883 5892d09-5892d13 880->883 881 5892d70-5892d86 call 5892820 896 5892e1a-5892e1f call 587ff60 882->896 897 5892dea-5892df9 882->897 883->882 885 5892d15-5892d1c call 5890848 883->885 889 5892d21-5892d5f 885->889 889->879 889->880 898 5892e25-5892e47 896->898 900 5892dff-5892e0a 897->900 901 5892ed6-5892ee0 897->901 904 5892ec9-5892ed3 898->904 905 5892e4d 898->905 900->901 903 5892e10-5892e18 900->903 908 5892ee3-5892eff 901->908 909 5892ee2 901->909 903->896 903->897 907 5892e50-5892e66 905->907 917 5892e68-5892e6d 907->917 918 5892e6f 907->918 910 5892fb0-5892fd5 908->910 911 5892f05-5892f07 908->911 909->908 914 5892fdc-5892fe0 910->914 913 5892f0d-5892f11 911->913 911->914 913->914 919 5892f17-5892f1f 913->919 915 5892fea 914->915 916 5892fe2-5892fe8 914->916 921 5892ff0-589301c 915->921 916->921 922 5892e74-5892e7a 917->922 918->922 923 5893023-589307b 919->923 924 5892f25-5892f27 919->924 921->923 926 5892e7c 922->926 927 5892eb2-5892ec7 922->927 956 589307d 923->956 957 5893083 923->957 928 5892f29-5892f31 924->928 929 5892f37-5892f3b 924->929 932 5892e7f-5892e85 926->932 927->904 927->907 928->923 928->929 933 5892fa9-5892fad 929->933 934 5892f3d-5892f41 929->934 932->901 936 5892e87-5892eb0 932->936 937 5892f59-5892f6d 934->937 938 5892f43-5892f57 934->938 936->927 936->932 944 5892f76-5892f78 937->944 945 5892f6f-5892f73 937->945 938->937 938->944 948 5892f7a-5892f8e 944->948 949 5892f91-5892fa1 944->949 958 5892fa3 call 5893189 949->958 959 5892fa3 call 5893198 949->959 956->957 958->933 959->933 961->881 962->881
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 007ad6ee22c89a230258c163636de88c3e134ed18b613e3e7a2b62d02d980711
                                                                                • Instruction ID: e97cb236a186f7a1819bd9d32d3eb437e28f9e5f653e489b52871daf29fb0eb4
                                                                                • Opcode Fuzzy Hash: 007ad6ee22c89a230258c163636de88c3e134ed18b613e3e7a2b62d02d980711
                                                                                • Instruction Fuzzy Hash: F5C16F35A002199FCF18DFA9C584AAEBBB6FF88310F148029E955E7355DB34EC41CBA1

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 963 5896470-589652d 972 589652f-5896547 963->972 973 589657e-5896593 963->973 978 5896549 972->978 979 5896550-589657c 972->979 976 5896599-589659f 973->976 977 58966a6-58966ad 973->977 980 5896821-5896871 976->980 981 58965a5-58965fa 976->981 982 58966b3 977->982 983 5896734-589673e 977->983 978->979 979->973 1012 5896873-5896875 980->1012 1013 5896877-589687b 980->1013 981->980 1010 5896600-5896634 981->1010 986 58966b6-58966bc 982->986 984 5896819-5896820 983->984 985 5896744 983->985 989 5896747-589674f 985->989 986->980 991 58966c2-58966ea 986->991 989->980 992 5896755-5896761 989->992 991->980 1004 58966f0-5896701 991->1004 996 5896807-5896813 992->996 997 5896767-5896774 992->997 996->984 996->989 997->980 999 589677a-58967a5 997->999 999->980 1011 58967a7-58967b3 999->1011 1004->980 1006 5896707-5896732 1004->1006 1006->983 1006->986 1015 5896686-58966a0 1010->1015 1016 5896636-589664e 1010->1016 1011->980 1017 58967b5-58967cd 1011->1017 1018 5896882-58968b0 1012->1018 1019 589687d-5896880 1013->1019 1020 58968b1-58968fb 1013->1020 1015->976 1015->977 1025 5896650 1016->1025 1026 5896657-5896684 1016->1026 1017->980 1021 58967cf-58967e2 1017->1021 1019->1018 1037 58968fd-5896935 1020->1037 1038 5896937-5896950 1020->1038 1029 58967e8-58967f2 1021->1029 1025->1026 1026->1015 1029->980 1032 58967f4-5896801 1029->1032 1032->996 1032->997 1037->1038 1040 589695b 1038->1040 1041 5896952 1038->1041 1041->1040
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6069eb445be318d2b29090d963f96d28007bb926e9f4dede44d8c5a5010428c5
                                                                                • Instruction ID: e4a30fef60bd4478cd5167fba6aa33a42b2c67beed344971a1e3ceac05c4e761
                                                                                • Opcode Fuzzy Hash: 6069eb445be318d2b29090d963f96d28007bb926e9f4dede44d8c5a5010428c5
                                                                                • Instruction Fuzzy Hash: 87E15B34A00615CFCB08DF69C5949AABBF2FF88300B598569E945EB365EB30FD41CB90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1045 146dc59-146dc7c 1046 146dc7f-146dc83 1045->1046 1047 146dc85-146dc9e 1046->1047 1048 146dca1-146dcd1 1046->1048 1104 146dcd4 call 146deb0 1048->1104 1105 146dcd4 call 146dc59 1048->1105 1051 146dcda-146dcf2 1053 146de94-146dec9 1051->1053 1054 146dcf8-146dd07 1051->1054 1062 146decf-146dee2 1053->1062 1063 146df7c-146df83 1053->1063 1055 146dd0c-146dd1c 1054->1055 1055->1053 1057 146dd22-146dd33 1055->1057 1059 146dd35-146dd41 1057->1059 1060 146dd43 1057->1060 1061 146dd45-146dd5f 1059->1061 1060->1061 1069 146dd61 1061->1069 1070 146dd09 1061->1070 1064 146df86-146dfb9 1062->1064 1065 146dee8-146defc 1062->1065 1076 146dfbe-146dfbf 1064->1076 1065->1064 1068 146df02-146df10 1065->1068 1071 146df12-146df1f 1068->1071 1072 146df21 1068->1072 1074 146dd66-146dd76 1069->1074 1070->1055 1075 146df23-146df35 1071->1075 1072->1075 1074->1053 1077 146dd7c-146dd8d 1074->1077 1106 146df36 call 146deb0 1075->1106 1107 146df36 call 146dc59 1075->1107 1079 146dd8f-146dd9b 1077->1079 1080 146dd9d 1077->1080 1082 146dd9f-146ddb9 1079->1082 1080->1082 1081 146df38-146df3a 1081->1063 1083 146df3c-146df79 1081->1083 1087 146dd63 1082->1087 1088 146ddbb-146ddc1 1082->1088 1083->1063 1087->1074 1090 146de25-146de36 1088->1090 1091 146ddc3-146ddc6 1088->1091 1094 146de5c-146de62 1090->1094 1095 146de38-146de3e 1090->1095 1092 146de13-146de1f 1091->1092 1093 146ddc8-146de10 1091->1093 1092->1055 1092->1090 1093->1092 1098 146de64-146de70 1094->1098 1099 146de78-146de7b 1094->1099 1096 146de54-146de5a 1095->1096 1097 146de40-146de4c 1095->1097 1101 146de7e-146de84 1096->1101 1097->1096 1098->1099 1099->1101 1101->1046 1102 146de8a-146de91 1101->1102 1104->1051 1105->1051 1106->1081 1107->1081
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 97ccf0b23eff58599625022bf5dc64be22cba4b8ab74e18b21e785bfc40f78f1
                                                                                • Instruction ID: 124b9977690c2d4b796fb5f948c50b1b14f05fe5dd05ffb2be8dee6edf435e1c
                                                                                • Opcode Fuzzy Hash: 97ccf0b23eff58599625022bf5dc64be22cba4b8ab74e18b21e785bfc40f78f1
                                                                                • Instruction Fuzzy Hash: 1DC10535E0060ADFCF01CFA8D9808AEBBB6FF59314B24845AE955A7321D731ED16CB91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1108 5891531-589156e 1110 589157d-5891584 1108->1110 1111 5891570-5891575 1108->1111 1112 589158a-589163c 1110->1112 1113 58918a5-58918e8 1110->1113 1111->1110 1160 58916fb-5891706 1112->1160 1161 5891642-5891648 1112->1161 1116 58918ea 1113->1116 1117 58918f1-5891904 1113->1117 1119 589190b-589190f 1116->1119 1120 58918ec-58918ef 1116->1120 1117->1119 1121 5891915-5891959 1119->1121 1122 5891af6-5891afd 1119->1122 1120->1117 1120->1119 1129 589195b-5891961 1121->1129 1130 5891963 1121->1130 1132 5891966-589196c 1129->1132 1130->1132 1134 589196e-5891974 1132->1134 1135 58919d5-58919e8 1132->1135 1138 5891983-5891989 1134->1138 1139 5891976-589197b 1134->1139 1136 58919ee-58919fa 1135->1136 1137 5891a73-5891a7e 1135->1137 1143 5891a09-5891a0f 1136->1143 1144 58919fc-5891a01 1136->1144 1141 5891ade-5891af3 1137->1141 1142 5891a80-5891a86 1137->1142 1145 589198f-58919b2 1138->1145 1146 5891b00-5891b23 1138->1146 1139->1138 1141->1122 1147 5891a88-5891a8d 1142->1147 1148 5891a95-5891a9b 1142->1148 1143->1146 1149 5891a15-5891a1b call 587c978 1143->1149 1144->1143 1158 58919c1-58919c7 1145->1158 1159 58919b4-58919b9 1145->1159 1147->1148 1148->1146 1152 5891a9d-5891abf 1148->1152 1154 5891a20-5891a37 1149->1154 1177 5891ace-5891ad4 1152->1177 1178 5891ac1-5891ac6 1152->1178 1163 5891a39-5891a3e 1154->1163 1164 5891a46-5891a4c 1154->1164 1158->1146 1165 58919cd-58919d1 1158->1165 1159->1158 1166 589170c-5891712 1160->1166 1167 58917a1-58917a8 1160->1167 1168 589164a-589164f 1161->1168 1169 5891657-5891660 1161->1169 1163->1164 1164->1146 1171 5891a52-5891a6d 1164->1171 1165->1135 1174 5891721-589172a 1166->1174 1175 5891714-5891719 1166->1175 1172 58917aa-58917af 1167->1172 1173 58917b7-58917bd 1167->1173 1168->1169 1169->1113 1176 5891666-5891674 1169->1176 1171->1136 1171->1137 1172->1173 1173->1113 1180 58917c3-5891803 call 5891bf6 1173->1180 1174->1113 1181 5891730-5891741 1174->1181 1175->1174 1182 58916ec-58916f5 1176->1182 1183 5891676-58916e4 1176->1183 1177->1146 1179 5891ad6-5891ada 1177->1179 1178->1177 1179->1141 1198 5891809-5891822 1180->1198 1184 5891750-5891756 1181->1184 1185 5891743-5891748 1181->1185 1182->1160 1182->1161 1183->1182 1184->1113 1186 589175c-5891789 1184->1186 1185->1184 1197 589178f-589179b 1186->1197 1197->1166 1197->1167 1201 589189d-58918a4 1198->1201 1202 5891824-5891834 1198->1202 1203 5891843-589184d 1202->1203 1204 5891836-589183b 1202->1204 1203->1113 1205 589184f-5891879 1203->1205 1204->1203 1207 5891888-5891892 1205->1207 1208 589187b-5891880 1205->1208 1207->1113 1209 5891894-589189a 1207->1209 1208->1207 1209->1201
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3bbc6223f11c44904eeab54c276def70748889add38ed1a7d81c598664031c07
                                                                                • Instruction ID: 434ab0c8001d602d6e508980e1fe7b8ba12a0b8f13b15889d5aa90a6116e7be1
                                                                                • Opcode Fuzzy Hash: 3bbc6223f11c44904eeab54c276def70748889add38ed1a7d81c598664031c07
                                                                                • Instruction Fuzzy Hash: 29C1B174A002059FDB58DF58C888EAEB7F2FB88314F558159E919EB3A1DB74EC41CB60

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1295 58951d8-589521f 1298 58954f8-589551c 1295->1298 1299 5895225-5895267 1295->1299 1306 5895523-5895586 1298->1306 1308 5895269-589526c 1299->1308 1309 589529d-58952be 1299->1309 1311 589526f-5895278 1308->1311 1315 5895371-589537b 1309->1315 1316 58952c4-58952cd 1309->1316 1311->1306 1312 589527e-589529b 1311->1312 1312->1309 1312->1311 1319 5895381-589538a 1315->1319 1320 58954f0-58954f7 1315->1320 1316->1306 1318 58952d3-58952f9 1316->1318 1332 5895308-5895315 1318->1332 1319->1306 1322 5895390-58953b9 1319->1322 1322->1306 1329 58953bf-58953e3 1322->1329 1329->1306 1335 58953e9-58953f5 1329->1335 1336 58952fb-5895302 1332->1336 1337 5895317-5895320 1332->1337 1338 58953fb-5895405 1335->1338 1339 58954e0-58954ea 1335->1339 1336->1332 1337->1306 1340 5895326-5895343 1337->1340 1338->1306 1341 589540b-5895427 1338->1341 1339->1319 1339->1320 1340->1306 1344 5895349-589536b 1340->1344 1341->1306 1345 589542d-5895439 1341->1345 1344->1315 1344->1316 1345->1306 1346 589543f-5895450 1345->1346 1346->1306 1348 5895456-5895461 1346->1348 1350 589546b-589547b 1348->1350 1350->1306 1352 5895481-589548d 1350->1352 1352->1306 1353 5895493-58954a8 1352->1353 1353->1306 1354 58954aa-58954cb 1353->1354 1354->1306 1356 58954cd-58954da 1354->1356 1356->1338 1356->1339
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fd5131b72b7dcda0ec39c0237300aa5f4b09323624a5e0b4d1f2694783a49c36
                                                                                • Instruction ID: 2cbc175b97c0b1411c49325e1c69d38babaa5759a5f0ddae468c17a0567a9f32
                                                                                • Opcode Fuzzy Hash: fd5131b72b7dcda0ec39c0237300aa5f4b09323624a5e0b4d1f2694783a49c36
                                                                                • Instruction Fuzzy Hash: 8EC14C34601216CFCB09DF58C584D7ABBF2FF84304B968499E9569B2A6DB30FD45CB90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1357 14641e0-14642bc call 146411c call 146412c call 1460204 1374 14642be-14642d4 1357->1374 1375 14642ff-1464312 1357->1375 1380 14642d6 1374->1380 1381 14642dd-14642fd 1374->1381 1378 1464314-146432a 1375->1378 1379 1464355-146437f call 1464ca8 1375->1379 1385 1464333-1464353 1378->1385 1386 146432c 1378->1386 1389 14643c4-14643e5 call 146fb13 1379->1389 1390 1464381-1464395 1379->1390 1380->1381 1381->1375 1385->1379 1386->1385 1427 14643e7 call 5873250 1389->1427 1428 14643e7 call 58714b0 1389->1428 1429 14643e7 call 58714c0 1389->1429 1395 1464397 1390->1395 1396 146439e-14643c2 1390->1396 1395->1396 1396->1389 1399 14643ed-1464403 1436 1464406 call 5873665 1399->1436 1437 1464406 call 5873690 1399->1437 1402 146440c-146442d 1405 1464461-14644a0 1402->1405 1406 146442f-146445f 1402->1406 1425 14644a3 call 5875730 1405->1425 1426 14644a3 call 5875740 1405->1426 1406->1405 1414 14644a9-14644de call 1460214 1430 14644e0 call 5876228 1414->1430 1431 14644e0 call 5876238 1414->1431 1418 14644e6-146450c 1432 146450e call 58792e0 1418->1432 1433 146450e call 58791da 1418->1433 1434 146450e call 58787a8 1418->1434 1435 146450e call 58787b8 1418->1435 1419 1464514-146452d 1421 146452f 1419->1421 1422 1464538 1419->1422 1421->1422 1423 1464539 1422->1423 1423->1423 1425->1414 1426->1414 1427->1399 1428->1399 1429->1399 1430->1418 1431->1418 1432->1419 1433->1419 1434->1419 1435->1419 1436->1402 1437->1402
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4b5e85d726cd31bd5ec1db6c12f66912b80f76f60c0264a5d88fc89eb3dd4d58
                                                                                • Instruction ID: f623e3f161c4f466aca0e6ae38663c505f2f2e9104fa325df21517eb47bdafe5
                                                                                • Opcode Fuzzy Hash: 4b5e85d726cd31bd5ec1db6c12f66912b80f76f60c0264a5d88fc89eb3dd4d58
                                                                                • Instruction Fuzzy Hash: 8DA15D34B002059FDB09EF69D994A6EBBE6FF88304B14842AE51ADB355DF74DC06CB81

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1439 14641f0-14642bc call 146411c call 146412c call 1460204 1456 14642be-14642d4 1439->1456 1457 14642ff-1464312 1439->1457 1462 14642d6 1456->1462 1463 14642dd-14642fd 1456->1463 1460 1464314-146432a 1457->1460 1461 1464355-146437f call 1464ca8 1457->1461 1467 1464333-1464353 1460->1467 1468 146432c 1460->1468 1471 14643c4-14643e5 call 146fb13 1461->1471 1472 1464381-1464395 1461->1472 1462->1463 1463->1457 1467->1461 1468->1467 1510 14643e7 call 5873250 1471->1510 1511 14643e7 call 58714b0 1471->1511 1512 14643e7 call 58714c0 1471->1512 1477 1464397 1472->1477 1478 146439e-14643c2 1472->1478 1477->1478 1478->1471 1481 14643ed-1464403 1519 1464406 call 5873665 1481->1519 1520 1464406 call 5873690 1481->1520 1484 146440c-146442d 1487 1464461-14644a0 1484->1487 1488 146442f-146445f 1484->1488 1508 14644a3 call 5875730 1487->1508 1509 14644a3 call 5875740 1487->1509 1488->1487 1496 14644a9-14644de call 1460214 1513 14644e0 call 5876228 1496->1513 1514 14644e0 call 5876238 1496->1514 1500 14644e6-146450c 1515 146450e call 58792e0 1500->1515 1516 146450e call 58791da 1500->1516 1517 146450e call 58787a8 1500->1517 1518 146450e call 58787b8 1500->1518 1501 1464514-146452d 1503 146452f 1501->1503 1504 1464538 1501->1504 1503->1504 1505 1464539 1504->1505 1505->1505 1508->1496 1509->1496 1510->1481 1511->1481 1512->1481 1513->1500 1514->1500 1515->1501 1516->1501 1517->1501 1518->1501 1519->1484 1520->1484
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e2b2914125b026b25085b916d9f65cae2c3fcb9fe3ba6e770782964e8b52f3c0
                                                                                • Instruction ID: f47f41a154a975cd21d885cf423e6735f9b6d844cf6636f0cdc78eae6bb60947
                                                                                • Opcode Fuzzy Hash: e2b2914125b026b25085b916d9f65cae2c3fcb9fe3ba6e770782964e8b52f3c0
                                                                                • Instruction Fuzzy Hash: 45916E34B002059FDB09EF69D594A6EBBE6FF88304B14842AE516DB359DF74EC06CB81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 053a2683855782f376fc8e82796bf35d03d6adeb76b2d09ff8954d4c5bf402da
                                                                                • Instruction ID: 8afd84804634c700eeaa750053381520accd164c8021dbe700b23027079ca5fc
                                                                                • Opcode Fuzzy Hash: 053a2683855782f376fc8e82796bf35d03d6adeb76b2d09ff8954d4c5bf402da
                                                                                • Instruction Fuzzy Hash: 08917930A103098BCB19DF69D95459EBBF6FF88754B14822AE815AF359DF70AC06CF80
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b2fadbcf14c518b40e3d5d5650c9abc3a96f94d9b909f94454f096904bb9a834
                                                                                • Instruction ID: 0329f60117d4c09faa1ead7b1728e3b371f1689db5708500c8eb952b3ce56f71
                                                                                • Opcode Fuzzy Hash: b2fadbcf14c518b40e3d5d5650c9abc3a96f94d9b909f94454f096904bb9a834
                                                                                • Instruction Fuzzy Hash: C3610131B0025ACBDF289B79985466EBBB6FFC8720B24842AD945EB345DF319C01C7D2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8445793422bd00c7d419e8ee3bdb33143cccaba740b5b6fac062084d3e6eb768
                                                                                • Instruction ID: f73bb1b1354324a019cb78bd401ad82fd4de32a8a4ddd98686b290b33f3a10af
                                                                                • Opcode Fuzzy Hash: 8445793422bd00c7d419e8ee3bdb33143cccaba740b5b6fac062084d3e6eb768
                                                                                • Instruction Fuzzy Hash: 34818074B0060A9FDB04DF68C884AAEB7B6EF84314F558199E905EB391DB70ED81CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0022cf23f5fde37af2b15a8aa4d115582ac1b9e6ecc53c48dd273c6a0ff50ab1
                                                                                • Instruction ID: 7f216fa8bb88b83dc0c1387ac59a144b1b6d77418e757c490f1d2e7e2a937d26
                                                                                • Opcode Fuzzy Hash: 0022cf23f5fde37af2b15a8aa4d115582ac1b9e6ecc53c48dd273c6a0ff50ab1
                                                                                • Instruction Fuzzy Hash: D051099381D3918BD707656CAD622D63FACDF231A9B58509BC284CF333E478455A83E3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 83bab9855b283c1d9f2d21ef921b639c328cb6bb25dd79d354137e3219e015aa
                                                                                • Instruction ID: 17b6655ab16f6afa30238a4df6182c6f3cede46b4cbc2eeaff3ea31e9e90d943
                                                                                • Opcode Fuzzy Hash: 83bab9855b283c1d9f2d21ef921b639c328cb6bb25dd79d354137e3219e015aa
                                                                                • Instruction Fuzzy Hash: 13813831604706EFCB24DF68C884A6EBBF2FF84304B488959E846AB655D770FD41CBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c1dc52c6cd8e7166c27103e39e10883377019b0217532f172813cf7d61a264b6
                                                                                • Instruction ID: 0843b22d838580c8c878a2be9dabfef0256d978c675b3234b3920deffaa54fb1
                                                                                • Opcode Fuzzy Hash: c1dc52c6cd8e7166c27103e39e10883377019b0217532f172813cf7d61a264b6
                                                                                • Instruction Fuzzy Hash: BC61BE71B002058FCB08DF68C8905AEBBF6FFC8214719856AE51AEB351DF71EC068B91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 02f51459cf19cffd3cbea6fd5750fa4857de1be7df2179533d2ca210f694634f
                                                                                • Instruction ID: 6b7331869dc93fdd4b9f6c64164cc66897077bb8fbd17525b309f43e29980259
                                                                                • Opcode Fuzzy Hash: 02f51459cf19cffd3cbea6fd5750fa4857de1be7df2179533d2ca210f694634f
                                                                                • Instruction Fuzzy Hash: 00616031B002199FDB18DF69C8989AEBBF2FF88314F548029E919EB351DB319D51CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 295c03cfbeddf562d593fb50c0f20c2011673bf4a1dd9907c19e6d0120df2dd5
                                                                                • Instruction ID: c063cdfe3c632d2c081573d20b2900292d68ea5d3cd8851e5f5fee7bf46aa0ba
                                                                                • Opcode Fuzzy Hash: 295c03cfbeddf562d593fb50c0f20c2011673bf4a1dd9907c19e6d0120df2dd5
                                                                                • Instruction Fuzzy Hash: CE61F634B10609CFCB15DF68D8949AEBBB6FF8D314B508169EA069B365DB30EC01DB81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 90cd3c0a05c5d67a1afa5ee2b57b1f115f47e25550ac827879250a97af17c575
                                                                                • Instruction ID: 5398b517207a968d7ef61f2b6c87f3387b9cbcb52566e487df758c05bf5b6d42
                                                                                • Opcode Fuzzy Hash: 90cd3c0a05c5d67a1afa5ee2b57b1f115f47e25550ac827879250a97af17c575
                                                                                • Instruction Fuzzy Hash: 915184307002058FDB58EB78C494B6EBBF2EF89610F549169E516DB791DB31ED02CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 49bdbb9bc52875ffced335697209c012eeb62330ee69ff1de73c1e72487bdd4a
                                                                                • Instruction ID: 5b456459f615f8c0b53fc074cca8d9191a302f77279808b3751e205987b75c77
                                                                                • Opcode Fuzzy Hash: 49bdbb9bc52875ffced335697209c012eeb62330ee69ff1de73c1e72487bdd4a
                                                                                • Instruction Fuzzy Hash: 95511C35A10619CFCB44CFA9C88499DBBF6FF8A700B25856AE505EF321DB71AD05CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6cef814cc193769be4059c81aa4ab556df74f45cf522b73af088056074fa9f5c
                                                                                • Instruction ID: f30d8c175880ffb21b1b7ede3482386ce19a352d015fea4d22416e0b504e8ada
                                                                                • Opcode Fuzzy Hash: 6cef814cc193769be4059c81aa4ab556df74f45cf522b73af088056074fa9f5c
                                                                                • Instruction Fuzzy Hash: 3351B034700744AFD719EB68D884B2EBBB6EF85210F548469E915DB3A2DB70EC41CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 68ac84290ae7151ef71647ca2d6a2c3e05e55192e3f1de6cd012c1e14040f676
                                                                                • Instruction ID: 760a14f13da3ee7c9ab9866ca99719787449f2bc8d9aa65279eaf23dcc6a27e1
                                                                                • Opcode Fuzzy Hash: 68ac84290ae7151ef71647ca2d6a2c3e05e55192e3f1de6cd012c1e14040f676
                                                                                • Instruction Fuzzy Hash: ED515E30E103099FDB05EFB4D854B9DBBB2FF89300F109929E514AB295DB75A985CF50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5d7fe66d58cef28f6c4f72a9e6d6511d17ed16c251257a3798392101d145f01f
                                                                                • Instruction ID: 585b465470658f6cdd1fc504571b24b132ce72fa03394621bfbff781ffd6b338
                                                                                • Opcode Fuzzy Hash: 5d7fe66d58cef28f6c4f72a9e6d6511d17ed16c251257a3798392101d145f01f
                                                                                • Instruction Fuzzy Hash: 8C512F30600201CFDB18CF29D894A577BB6EF89365B4041A9EA15DF3AADB30EC52CF91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d7e9780e6d24c8dde3aba561655c3f7807880c116d98e314d601585d120c7ce9
                                                                                • Instruction ID: 6c867a0e8ea70643ded7d1b468466573bc4cd95ab68dcc183fc847a4be280cf5
                                                                                • Opcode Fuzzy Hash: d7e9780e6d24c8dde3aba561655c3f7807880c116d98e314d601585d120c7ce9
                                                                                • Instruction Fuzzy Hash: F651357470060A9FDB08DF68C885A6EBBB6EF84314F558099E905DF3A1DB71EC42CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 36b4bfd47c5493f6376f0d5caf60e73d421af5af6a675623b304d3bf9730bc5c
                                                                                • Instruction ID: 956d03e27d041b7585066575840e011ff728087ec35f4932693670dd69b0cba4
                                                                                • Opcode Fuzzy Hash: 36b4bfd47c5493f6376f0d5caf60e73d421af5af6a675623b304d3bf9730bc5c
                                                                                • Instruction Fuzzy Hash: EF515C30E10309DBDB04EFA4D954B9DBBB2FF88300F10952AE514BB295DB75A985CF50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0b1a68e3af3d786a79c983028437807aa3bbf328979e4d5659ada3d99c2c8ea8
                                                                                • Instruction ID: fa5f24aecc25f5a23e9c18b0d9b0f1499dccae5527c558dae1582c78c1430da4
                                                                                • Opcode Fuzzy Hash: 0b1a68e3af3d786a79c983028437807aa3bbf328979e4d5659ada3d99c2c8ea8
                                                                                • Instruction Fuzzy Hash: 9A412C74B00209DFDB04DF99C48096A7BFAEB8D614B548056E945CB329DB31DD029B52
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b6f90457ecad9cff3d7163b627b249fe69b7d50011e4efc2e6daa8912cd21683
                                                                                • Instruction ID: 01ed9949af7d68ff1c5249e79bec616c49a7d85aad23c0f2dbe999b6944d6300
                                                                                • Opcode Fuzzy Hash: b6f90457ecad9cff3d7163b627b249fe69b7d50011e4efc2e6daa8912cd21683
                                                                                • Instruction Fuzzy Hash: 3E31E430B043495BDB08AFA9844076E7BEABFC4658F44456AED49CB394DF34DC05CB92
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a3ce2bd27c20bdd6f23d2b9da8a99540480d29e28db1653cffa63b10fee9e841
                                                                                • Instruction ID: 6eb0db590bc16893888491fac3c9e292d05fadb1bd12aed0ea589da64f3a3b89
                                                                                • Opcode Fuzzy Hash: a3ce2bd27c20bdd6f23d2b9da8a99540480d29e28db1653cffa63b10fee9e841
                                                                                • Instruction Fuzzy Hash: 8F415B34600201CFDF18DF29D88865B7BA5EF89315B4481A9D915AF3AADB30ED52CF91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6e5ce36731f7d7ef68a3faae62cf40851365aa18105f5c8ca154289431288ca3
                                                                                • Instruction ID: 50665f1ebd854d7281ebb7ec25ede522b7fddd054a1ec67a850b4b493ee2e334
                                                                                • Opcode Fuzzy Hash: 6e5ce36731f7d7ef68a3faae62cf40851365aa18105f5c8ca154289431288ca3
                                                                                • Instruction Fuzzy Hash: D23108327042444FC709AB38D8A56DA7FB6EF91224F0941ABD5059B392EE709C068792
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4390332a27facfe6a93e91044f98d064727f8c9105d6ae26f88da2828506f088
                                                                                • Instruction ID: e266769245133143913a7cb1ed4484e32f46d88c5744520e9d98922a5fe20fc4
                                                                                • Opcode Fuzzy Hash: 4390332a27facfe6a93e91044f98d064727f8c9105d6ae26f88da2828506f088
                                                                                • Instruction Fuzzy Hash: E7315A34B002058BDB149E69C4986AFFBFAAF89258F58456AD506E7364DF70DC028BA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e8c5e180b167557d954d2242c573bd3d49626ba82ffacbd57c784a30c22223ba
                                                                                • Instruction ID: 69b3965152855c3979b103211e309a02f3aa6edaf2df326e74318f3314f0831f
                                                                                • Opcode Fuzzy Hash: e8c5e180b167557d954d2242c573bd3d49626ba82ffacbd57c784a30c22223ba
                                                                                • Instruction Fuzzy Hash: 013105366043418FCB15DB7DD89159EBFE9EF86214748816BD845CB363EA30C909C7A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c142749efb8a92cb0c5b306c14b4c5fe93129b3003b3628a4ec957dc20b6e170
                                                                                • Instruction ID: 2797a28b0a7743634c4cb162d6703a8104a247a83e26d994572ad7c0ab85f78e
                                                                                • Opcode Fuzzy Hash: c142749efb8a92cb0c5b306c14b4c5fe93129b3003b3628a4ec957dc20b6e170
                                                                                • Instruction Fuzzy Hash: F03121313003584FCB09BB7D949462EBAD7AFC5661368816AD90ACF3A5CF35DC038796
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9fa747fb43b080c671aed5c2712462c3c6e3a11c74f51a63b11a0b78b5bdc9c0
                                                                                • Instruction ID: 0140b745c5ec096228e57c9b9c241a4f7c041f5b89567c0c0ffa527610474af3
                                                                                • Opcode Fuzzy Hash: 9fa747fb43b080c671aed5c2712462c3c6e3a11c74f51a63b11a0b78b5bdc9c0
                                                                                • Instruction Fuzzy Hash: 24414F3560060ADFCB05CF58C8909AABBB5FF49354B24C45EF9499B321D731E916CF50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 96735af99028991371564ab2a0d0eda68104fa79186525cbef6afaf99fb72885
                                                                                • Instruction ID: 8fe99716969c3357f2eb7714486732228bb23cc7e74214c8596f70b3fc8f4b44
                                                                                • Opcode Fuzzy Hash: 96735af99028991371564ab2a0d0eda68104fa79186525cbef6afaf99fb72885
                                                                                • Instruction Fuzzy Hash: 2F418074E012199FDB58DFAAD940AEEFBF6BF88304F14812AE814A7364DB305942CF51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8c43e27e650d6f0cdf551d4a3b0cf13b5979e6bae016c1c91659d9ca05529155
                                                                                • Instruction ID: c016c58ebc13e87f1e44da9de88d9aab875433b7ec58d5770ee829388fb46abe
                                                                                • Opcode Fuzzy Hash: 8c43e27e650d6f0cdf551d4a3b0cf13b5979e6bae016c1c91659d9ca05529155
                                                                                • Instruction Fuzzy Hash: A331D0313143528BD70ABB7DD8A059F3BAAEFD6214744812BC505CB395EE709C0A8BD2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 517360d9702bbf4ec225f58b9bfc4d55ecaf2ebc9f64eef7441b1cda7ac6ade4
                                                                                • Instruction ID: 58989f7f8310324f5673c227303cb48924a28f7edd6f6482a2fa3397b4bda20b
                                                                                • Opcode Fuzzy Hash: 517360d9702bbf4ec225f58b9bfc4d55ecaf2ebc9f64eef7441b1cda7ac6ade4
                                                                                • Instruction Fuzzy Hash: 1031A4357053449FC715DB78D844A5ABFE6EF86214B18C4AEE459CB362CA71EC05C790
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ba2a697ec8f29e156d21870365667c0112fd13f41ef159a305a7ac2003aff684
                                                                                • Instruction ID: fb181fe79f75f92a7aae2f12cf3e6195903220f505511c6e4755a5fd20877836
                                                                                • Opcode Fuzzy Hash: ba2a697ec8f29e156d21870365667c0112fd13f41ef159a305a7ac2003aff684
                                                                                • Instruction Fuzzy Hash: 6531B275E002099FCB04DFA9C9849EEBBF6FB88310F198029E915F7251DB30AD41CBA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e5f0ffdef1ee9166e2253b3cb7cbc6438d57f276a1c15d1573f359f8ba827afc
                                                                                • Instruction ID: ee5caf93c9ad9170f025cb0c144be42b6d54f03f539742e7ff5f662c26bd5b6f
                                                                                • Opcode Fuzzy Hash: e5f0ffdef1ee9166e2253b3cb7cbc6438d57f276a1c15d1573f359f8ba827afc
                                                                                • Instruction Fuzzy Hash: DF3126306007018FD734CF2AC84866BBBF6AF89218B144A2DD596DB7A5DB70E946CF81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8d0d11ab7acce9577164a71bb6e06d239334d6976b3f1b210998e3c9f66692f6
                                                                                • Instruction ID: 1577646ab689b83e59a3387c2b80b1c6fd3524e5d1c5b9e58c4ff88043bed72d
                                                                                • Opcode Fuzzy Hash: 8d0d11ab7acce9577164a71bb6e06d239334d6976b3f1b210998e3c9f66692f6
                                                                                • Instruction Fuzzy Hash: F0213031B00204CFDB14CF58C955AAABBF6EF89659F54845AE406EB360DB31ED01CB61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2d03d538062fde8656c8180d1d7bb7d7177cf7ea0b9d7c9589c503ac3d51c97e
                                                                                • Instruction ID: c4f98020a61a688cbd0ac77a8036b6b28b36a0101ecfb9ae91340c7fe82606d0
                                                                                • Opcode Fuzzy Hash: 2d03d538062fde8656c8180d1d7bb7d7177cf7ea0b9d7c9589c503ac3d51c97e
                                                                                • Instruction Fuzzy Hash: 3F311770600701CFC734CF2AC84465ABBF5AF89328B104A2DD5A6DB7A5D771E946CF81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fe22b127f910575cb89688eb47ccd610bce29cc690b0b527a7763fbae80cbc9b
                                                                                • Instruction ID: f858b03145606962672c4211ad197ad464c3114a29211440168905c3ae1ff473
                                                                                • Opcode Fuzzy Hash: fe22b127f910575cb89688eb47ccd610bce29cc690b0b527a7763fbae80cbc9b
                                                                                • Instruction Fuzzy Hash: A731917560410A9FDB68DF98D884BAE77B6EB84301F048124EC1AD7685DB71AC40CB60
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 28cfff1499abfe8d241382562bcf8e2a97ec86e64c40af565addd04f8f3c0171
                                                                                • Instruction ID: 2d443e868557f1aa039605c22d4d9b65446b4bab9a8c7f43fd141dfc69b596ca
                                                                                • Opcode Fuzzy Hash: 28cfff1499abfe8d241382562bcf8e2a97ec86e64c40af565addd04f8f3c0171
                                                                                • Instruction Fuzzy Hash: 9A217F313202069B9609BB7ED9A491F3ADBEFD5658344822ED119CB758EF709C0687D2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ff07ad8ff8a678ab8113e4e9436cf5684ae8d5205282398321fefe1ececaace4
                                                                                • Instruction ID: 2028705c3cb4eaf1ebdee4842224b81f13aca1085bb89c7988bbe6374e28a117
                                                                                • Opcode Fuzzy Hash: ff07ad8ff8a678ab8113e4e9436cf5684ae8d5205282398321fefe1ececaace4
                                                                                • Instruction Fuzzy Hash: 92214130B012099BDF1CDBA5E5586BEBBB7FBC8604F248029E816A7394DF745D46CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ababc9f0b2cc8c23cbeb8d5c67d00db30f895c452568af4c17a79c087cc9b1ae
                                                                                • Instruction ID: 803e11020f3425b2a46ad386800ba630f799350b2882b555496831c4f4df2c2f
                                                                                • Opcode Fuzzy Hash: ababc9f0b2cc8c23cbeb8d5c67d00db30f895c452568af4c17a79c087cc9b1ae
                                                                                • Instruction Fuzzy Hash: 3621F3317002088FCB09EB28D9945AEBBF6FFC5214B18816BE506DB355DF71EC0A8B91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fd2167d6b6f244e0a91b9e5d76685a01cda6e32ec001f175586169a951134cd1
                                                                                • Instruction ID: efa355065fe4b163396728a4f3ba9ae664e9fcded52202ef76353354d35471a0
                                                                                • Opcode Fuzzy Hash: fd2167d6b6f244e0a91b9e5d76685a01cda6e32ec001f175586169a951134cd1
                                                                                • Instruction Fuzzy Hash: 43218C306047018FD734CF29D94466ABBF9AF88318B041A2ED566CB3E4DBB0E845CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 548e92cfa0723ad5b97fa26a33dc0cf50de88d85fa083fdfa2ede292277b9b5f
                                                                                • Instruction ID: 875d359060b5fd1dd27284367a265b805153b9f788068cda8addf2c3d2a0b961
                                                                                • Opcode Fuzzy Hash: 548e92cfa0723ad5b97fa26a33dc0cf50de88d85fa083fdfa2ede292277b9b5f
                                                                                • Instruction Fuzzy Hash: 41217130B012099BDF1CDBA4E558BBEBBB7FB88604F284029E812E7394DB745D46CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c334ac2004b40a11bb65ef9e9c378c86fabd18817162f325a44282b8508b8345
                                                                                • Instruction ID: ab10069cf2e7fb1e3d1356b64c445f53c50c43bd0c28a10c8fca4e812eb7241b
                                                                                • Opcode Fuzzy Hash: c334ac2004b40a11bb65ef9e9c378c86fabd18817162f325a44282b8508b8345
                                                                                • Instruction Fuzzy Hash: E4210474700640ABDB1C9B6AD845B6DFBB2FBC8311F148129F92AC7780DB30AC81C780
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 251a4937a157de1e25441f5efaf4f878390d9a515ce20d041ca9459899ad1fa1
                                                                                • Instruction ID: b4fa88a81692307948ed90701c4c8c8e9d40b2787f8a8108a4628d0c55348110
                                                                                • Opcode Fuzzy Hash: 251a4937a157de1e25441f5efaf4f878390d9a515ce20d041ca9459899ad1fa1
                                                                                • Instruction Fuzzy Hash: 5121F075E012188FDB19CFBAD8006EEBBF6AF89304F14C16AD814A7264EB745946CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 65e0223237125d51f4d987de8c69ec7076a82cc9f221f0395ed82121dc78af10
                                                                                • Instruction ID: ae61e940488669bd06fa0db1dbfe22b13d2423b8b317821b740eb80b1f785549
                                                                                • Opcode Fuzzy Hash: 65e0223237125d51f4d987de8c69ec7076a82cc9f221f0395ed82121dc78af10
                                                                                • Instruction Fuzzy Hash: 9E217F30600105CBDF28CF28D9C469B7F79EF48365B0442A9D9259F2AADB31D851CBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1e505be29bbd018a9a2a3b4cf62dc49c12bdb0dc16fdb19870d83a45019b4bfb
                                                                                • Instruction ID: 344d3a1bfd25cf883017a5c7e200bc13fe5cac69852cf0b8af98d0904d8b96a0
                                                                                • Opcode Fuzzy Hash: 1e505be29bbd018a9a2a3b4cf62dc49c12bdb0dc16fdb19870d83a45019b4bfb
                                                                                • Instruction Fuzzy Hash: 8F2101316042058FCF068F68D8807DA7F74EF49368F0840A7D900EF2A7DA31D846CBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 03d6faa49e7f12b6fbcef054470ef923a36cc6e37e740464289bba394db3ae27
                                                                                • Instruction ID: 0def339c2c8ba531460e4e0e43c08c95d1b525dc66e031e9e7b483e094fec35b
                                                                                • Opcode Fuzzy Hash: 03d6faa49e7f12b6fbcef054470ef923a36cc6e37e740464289bba394db3ae27
                                                                                • Instruction Fuzzy Hash: EE211A70B002099FCB44DF69C485AAEBBF2FF89720F245069E905EB351DB31AC41CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 85f4339c99be35fead412757c811e67389b5da8751d3495f1ff6b442ee8ddd38
                                                                                • Instruction ID: 99b2bfba0650145e0f869027365eda3e0fef144cd2472e200bf7e98451dbc204
                                                                                • Opcode Fuzzy Hash: 85f4339c99be35fead412757c811e67389b5da8751d3495f1ff6b442ee8ddd38
                                                                                • Instruction Fuzzy Hash: 81214C302007018FDB38CF69D958697BBB5EF48364B044A2DE562976A1DB31E94ACF81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d9e379b02a561675ece6d7945c117cd26c4c589581534708c6ccaea04bbfb820
                                                                                • Instruction ID: 74888a4654d777a055c6376e7cd78bd142461cb7745e1677bf41e4cfbe570a10
                                                                                • Opcode Fuzzy Hash: d9e379b02a561675ece6d7945c117cd26c4c589581534708c6ccaea04bbfb820
                                                                                • Instruction Fuzzy Hash: 9F11BE757002048FD719DBA8D880B6A7BEAFFCD258B14811AE99A87311CF36EC028B51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d2c80355f6a12d9a990f3b73102b54e3f204c17aa5ee06f4ece46638ef2dbf3b
                                                                                • Instruction ID: 50e731a07a28456f08f492609be8f7dea411dad53ab5ee5e39111be6c8b56547
                                                                                • Opcode Fuzzy Hash: d2c80355f6a12d9a990f3b73102b54e3f204c17aa5ee06f4ece46638ef2dbf3b
                                                                                • Instruction Fuzzy Hash: 781193316106059FCB15DB18D480D66FBE5FB46354B28C669FC59C7711EB31FC428B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 67fecf585b772f53ec851ce9896277d874c291e087806d8828e6c503d434e930
                                                                                • Instruction ID: ffffd3a54733bd292f342710d545e9bc781a7bd33cea42d985f659cd15ae6bcb
                                                                                • Opcode Fuzzy Hash: 67fecf585b772f53ec851ce9896277d874c291e087806d8828e6c503d434e930
                                                                                • Instruction Fuzzy Hash: 671182757002048FD719DBADD890A6A77E7FFCD258714841AE55AC7311DF36EC028B51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 08a691b35c5c4c58b05c9c2dd5797ee293036816d4d2c382f542fee515c3c246
                                                                                • Instruction ID: 7ab8eea08770745fb1c3c7eb3954b5b893de3ad87a7b2eb0c0c37c53fc2e84ee
                                                                                • Opcode Fuzzy Hash: 08a691b35c5c4c58b05c9c2dd5797ee293036816d4d2c382f542fee515c3c246
                                                                                • Instruction Fuzzy Hash: 500192363101149B8B08E66DF49496AB7AAFFD9625318847BE509C7355CF26DC02C794
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e1acdadaecbf4d4b44bb659b258a1289c7670a24a85e82ec3030fa33fa6d1c5c
                                                                                • Instruction ID: 510129d10b233ddc8459af9c79aa36116625602b16c5e6a6aa583686c814542d
                                                                                • Opcode Fuzzy Hash: e1acdadaecbf4d4b44bb659b258a1289c7670a24a85e82ec3030fa33fa6d1c5c
                                                                                • Instruction Fuzzy Hash: 8611AB32B142499FCB099B2498648BEBFB6FFC620071880A9D904D7311DB34DD06CBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1706feaf47cd0d6c06a0cf998c9c6c3e4d15bcb9adf3da1c4faeef793c135a45
                                                                                • Instruction ID: c8d7f7750550360e8dfe6940d353b29b9ec8b008816e0621adf98d1125669153
                                                                                • Opcode Fuzzy Hash: 1706feaf47cd0d6c06a0cf998c9c6c3e4d15bcb9adf3da1c4faeef793c135a45
                                                                                • Instruction Fuzzy Hash: 7201A172F001198FCF14DAA9EC496FEBB7AFB88655F040125E926E3280DB305D018BA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 100939eea374e8944326f83a0abb8858ad8987e8fa23d4ede4059705ae7908cc
                                                                                • Instruction ID: 9b4b71ebb3f9ed688a34a6780e3af834e1fedaa095f5a5dd8d6ddb68b850e3f8
                                                                                • Opcode Fuzzy Hash: 100939eea374e8944326f83a0abb8858ad8987e8fa23d4ede4059705ae7908cc
                                                                                • Instruction Fuzzy Hash: E01151B4E00309DFCB04DFB8D5509AEBBB1FF49204F1184AAD424A7350D734A902CFA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 35eeb1a4ba56490cf2bfe5ea5a67bd0355276674a1c9411ede26f9af116bf5d2
                                                                                • Instruction ID: 0f1ce9ad9d7f7dd765381f24de9082f8a7f73bb32fa46339067802257b1964b4
                                                                                • Opcode Fuzzy Hash: 35eeb1a4ba56490cf2bfe5ea5a67bd0355276674a1c9411ede26f9af116bf5d2
                                                                                • Instruction Fuzzy Hash: 6F012B317042908FC745872DA858A567FE99F9A621F6940EBF549CB3A3CD208D01C766
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6d35a303bcece310ce9d74221fe2b591488d9147b5db7f52ad8210cd33f3c394
                                                                                • Instruction ID: 3282944f444a8c23297a0a004235998a1fdb99e818398ea631312740cf7c2dea
                                                                                • Opcode Fuzzy Hash: 6d35a303bcece310ce9d74221fe2b591488d9147b5db7f52ad8210cd33f3c394
                                                                                • Instruction Fuzzy Hash: F3112EB4E0020ADFCB08DFA9D5449AEBBB5FF88204F10856AD525A7350DB34A902CF91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9c4ee51d28c6aba96d39e005873a97ddb47c7e1754133fe3759618c1e2409cd4
                                                                                • Instruction ID: 84b70f18159be16d5f573f062df7d113fee39273ae7f0c448907fac842fbf5f3
                                                                                • Opcode Fuzzy Hash: 9c4ee51d28c6aba96d39e005873a97ddb47c7e1754133fe3759618c1e2409cd4
                                                                                • Instruction Fuzzy Hash: 50015E367002049FC704DB39D988C6FBBEAEFC92143558479E809CB365CE31EC018B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2440ed5145b905b98d46e996453ec2ef98eaa8ecdcabcf2cbe0c5d2691d0a482
                                                                                • Instruction ID: 2a7b997fac73508e061029c9dc8462b079bdad74f045d0286e3c90ef7c21fe42
                                                                                • Opcode Fuzzy Hash: 2440ed5145b905b98d46e996453ec2ef98eaa8ecdcabcf2cbe0c5d2691d0a482
                                                                                • Instruction Fuzzy Hash: AA113C30B00215CFCB08DB68C458AA9BBF6BF89700F140469E902E73A0CF759D41CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2178635918.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_118d000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: af581785a8c74eaa6dd75b878a5caac6e72262d881466faf4d65c8b2fa472cfd
                                                                                • Instruction ID: 66e6243e4827042f5b6397703671b859b9fc5fbf59bb3e9f515f99212bfc8be2
                                                                                • Opcode Fuzzy Hash: af581785a8c74eaa6dd75b878a5caac6e72262d881466faf4d65c8b2fa472cfd
                                                                                • Instruction Fuzzy Hash: 8D01F7714053449AEB186A69ED84B67BF98DF413A4F18C41AEE094B2C2C7B99442CAB2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6aca5cf3a667194789df1696ca6d742ec7bfb895d9e3d6fb3e1679601087da42
                                                                                • Instruction ID: 6901af3f720a68710fb6d83a9690d71b853281c9f80b0cdc4aa5ded25c462f76
                                                                                • Opcode Fuzzy Hash: 6aca5cf3a667194789df1696ca6d742ec7bfb895d9e3d6fb3e1679601087da42
                                                                                • Instruction Fuzzy Hash: 63F0A4367102099FDB04DA55D955AAABFAAFB89214B288034EE04D3354DB31ED1587A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9936f5e4f035423bef5b34a3ccb005984a297a5613a051e4bd53d9e86899be53
                                                                                • Instruction ID: 89d58d66d915c815a054bf55e4a7b9374ad20ef84a2226ee32f0ca8b2f06bdff
                                                                                • Opcode Fuzzy Hash: 9936f5e4f035423bef5b34a3ccb005984a297a5613a051e4bd53d9e86899be53
                                                                                • Instruction Fuzzy Hash: F501D21511E3D05FDB07972858A57963F315F93214F1A88D7C4C1CB1B3CA18481AC762
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d76c14d0356f1f142be632de6f072282471a69efcf9d717b8e69516683be5bd3
                                                                                • Instruction ID: f698099fda270ac91785a30765093c72ebecc39e124ca48a9cb278032b438ad8
                                                                                • Opcode Fuzzy Hash: d76c14d0356f1f142be632de6f072282471a69efcf9d717b8e69516683be5bd3
                                                                                • Instruction Fuzzy Hash: FAF0B4323001006BD6189A9DDC90B6FB79BEBC8760B24842AE919C7355CE32DC0387A0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 09aa3dd9da2c391bb6b20386d6cf695151cb5386e96f7ec226d9588b958c119d
                                                                                • Instruction ID: ed3a0e09c7bf8f9f2c500288451cb90fabce341d69d096ffdfdf3d3594700d41
                                                                                • Opcode Fuzzy Hash: 09aa3dd9da2c391bb6b20386d6cf695151cb5386e96f7ec226d9588b958c119d
                                                                                • Instruction Fuzzy Hash: F6F02B353043105BD714AA6ED890E5BBFBAEBD16A8B04842ED905CB300DF65DC05CBD0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b7942d6307c40c8fe8d129777f4e9447db602fc47f4b5f0664e37824ce9eaf3a
                                                                                • Instruction ID: 5bb6db663eb90551ddec48e16fda069d23ea151fce5d53b748ac6783984d56a8
                                                                                • Opcode Fuzzy Hash: b7942d6307c40c8fe8d129777f4e9447db602fc47f4b5f0664e37824ce9eaf3a
                                                                                • Instruction Fuzzy Hash: 7601A270E043499FCB18CFACD8556AE7FF4EB04228F24495AE524D73B2D33085468F92
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2178635918.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_118d000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5e99d47e07aa20e6b3d014c55000d4ccf12cbfcc724404a85f486758351fc1d9
                                                                                • Instruction ID: 68ef626e982add6cd9ed5f487b87c81810857aa276e036e039e810b17164be52
                                                                                • Opcode Fuzzy Hash: 5e99d47e07aa20e6b3d014c55000d4ccf12cbfcc724404a85f486758351fc1d9
                                                                                • Instruction Fuzzy Hash: 49F0C272405344AEEB148A19DC84B62FF98EB41664F18C45AED484B283C3799841CAB1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: beba96e177b1c51d67cebe440831972de94d6a499958b3563ea6c7d9fc595fce
                                                                                • Instruction ID: e00c0a8ee0582775548bb57c3301dcb9a18530789851d578c5a86fa61dd11d0e
                                                                                • Opcode Fuzzy Hash: beba96e177b1c51d67cebe440831972de94d6a499958b3563ea6c7d9fc595fce
                                                                                • Instruction Fuzzy Hash: 7FF0F6343202424FC72BA77CA56019E3FB5EEC6654304C46FD065CB35AEF38980A8B81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e83b854a7ea456f0930fb2d1112b68d4cdc804d8646bc056e71dcda8d27f2e28
                                                                                • Instruction ID: a6415f1ba7b0b53ac61d6e5f0062c664f24e6d424c6d086454174e8f2d77ac5b
                                                                                • Opcode Fuzzy Hash: e83b854a7ea456f0930fb2d1112b68d4cdc804d8646bc056e71dcda8d27f2e28
                                                                                • Instruction Fuzzy Hash: 91F0A735300315579B28AA6EE890C5BBFFAEBC56A5344842AEA09CB304DE75EC059BD0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3d773fc458ff62e674c0a6b82688111d72181b528ab8d27ab5aca798f3dbd5e8
                                                                                • Instruction ID: 26fcf66c9acf519aa06eb24f45faf9c014944b59ec33007c41253833fd83508f
                                                                                • Opcode Fuzzy Hash: 3d773fc458ff62e674c0a6b82688111d72181b528ab8d27ab5aca798f3dbd5e8
                                                                                • Instruction Fuzzy Hash: B1E02B313016145FC604666EAC48A5ABBDEEFCE62075040B9FA1DC7355CD208D0293A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b9f6a41b9a85c0497fe5f0d1d82495198a11acf570e6cba77e7e3a688eae91ae
                                                                                • Instruction ID: 615365eeff90ebfa01e4703b8ac82e5b0f72fac463adb29141361216aa3c62a3
                                                                                • Opcode Fuzzy Hash: b9f6a41b9a85c0497fe5f0d1d82495198a11acf570e6cba77e7e3a688eae91ae
                                                                                • Instruction Fuzzy Hash: 94F0B8A398E2C48FE30383288CB01913FB4DA23259B0A01CBD484CB2B3E01889099362
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: dfeb29578a23baf737c6e8b86cbb23b20b5263ee4259c665a6b523a12bbf96d8
                                                                                • Instruction ID: ac8e4f35357c8eb0d905801400f76ad6af0154924ff9c23d5f38b32d6f4fa068
                                                                                • Opcode Fuzzy Hash: dfeb29578a23baf737c6e8b86cbb23b20b5263ee4259c665a6b523a12bbf96d8
                                                                                • Instruction Fuzzy Hash: 61F0A7353206064B872BBB2DE51455F37AAEFC5655300C42ED529D7349EF34DC058BD2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0e475cecb76602966a4c899a5bc092cd4f891c27403abc4b670bb70873ba1324
                                                                                • Instruction ID: 2e3b47e55d00c6b1dac8b3192fc9a2e94ea051ce236194448e8bc92fe43e8811
                                                                                • Opcode Fuzzy Hash: 0e475cecb76602966a4c899a5bc092cd4f891c27403abc4b670bb70873ba1324
                                                                                • Instruction Fuzzy Hash: 91F0E535304214EFD709AB79D894A2ABBEAFFC8314B14812DE508C3356CE71DC418790
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d7bd4bc155779694b8ada91b5ae9661e2d3e0c37b6e3095fa99ddbaa21b03c3a
                                                                                • Instruction ID: a9b340a9b51430763bbc8bd0774aebdf83c10ea20b7a1b1f722f96b02979bb77
                                                                                • Opcode Fuzzy Hash: d7bd4bc155779694b8ada91b5ae9661e2d3e0c37b6e3095fa99ddbaa21b03c3a
                                                                                • Instruction Fuzzy Hash: F4E065353505145FC7449B6EE858E5ABBEAEFCCB21B614069F209CB361CE61DC018795
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8f95a889eba9f132981c1508e52c2e1ba0f3e2e6ca64f5ad545d1f96be416c31
                                                                                • Instruction ID: 7540d1511a88ef21793d0c3a99dae59a698e80e51ce87b60f7d582c9d06e1c34
                                                                                • Opcode Fuzzy Hash: 8f95a889eba9f132981c1508e52c2e1ba0f3e2e6ca64f5ad545d1f96be416c31
                                                                                • Instruction Fuzzy Hash: 8AF03070E0020ADFDB68DFADC85566EBFF4EB08324F20465AE524D73A1D77195418F92
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 280938d132f076fb2976e1e362dfbb44b731060a10a19cfbed7ba85f4bf62ed3
                                                                                • Instruction ID: 397ce7e307ce11735c839beeb70a8912f52d52068e43e4e231741d939b3aff10
                                                                                • Opcode Fuzzy Hash: 280938d132f076fb2976e1e362dfbb44b731060a10a19cfbed7ba85f4bf62ed3
                                                                                • Instruction Fuzzy Hash: 6EF0BE70E00249DFCB44CFACD545AAEBFF4FB04218F20096AE914E33A2DB3086448F82
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7510f80af3b8f96398800d39b5b2b4ca138c88bb01969521a2d926a1307da15b
                                                                                • Instruction ID: 61d49ad06405436fd9f671bc6495eb06e92542158e9d535fa9d506c0cf5c8622
                                                                                • Opcode Fuzzy Hash: 7510f80af3b8f96398800d39b5b2b4ca138c88bb01969521a2d926a1307da15b
                                                                                • Instruction Fuzzy Hash: D7F0F870E042099FCB54DFA8D5556AEBFF8EB08214F2046AAE518E32A1D77186418FC2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8794f49817253db1712b24f5f2649ba779f4904938a054c05688fa001eec75e5
                                                                                • Instruction ID: 77be8a914f82715f128bd02d6db0286fea7bc7404a16daca600ea6bb43068ce7
                                                                                • Opcode Fuzzy Hash: 8794f49817253db1712b24f5f2649ba779f4904938a054c05688fa001eec75e5
                                                                                • Instruction Fuzzy Hash: 6EE0DF31742750BBC7295219AC05F0ABBAA9FC6A21F204029E9098B380CE61BC02C386
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5da30698466bfb7fecf48c6515bcf6847cc3a1feeea1f288f9bce770417dfaef
                                                                                • Instruction ID: ffec6599f6e0e3455f12df040b09511674b606bef6103226280aab2eb1f90238
                                                                                • Opcode Fuzzy Hash: 5da30698466bfb7fecf48c6515bcf6847cc3a1feeea1f288f9bce770417dfaef
                                                                                • Instruction Fuzzy Hash: DBE08C32B201155B8F18911C9C42965B7CAE78A264B3C8671FD28E7780FB21DC0383E5
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 07b95502c780bae21d6bfcf35c962c1e838089079ff50143f0c5b16c23f6c154
                                                                                • Instruction ID: beca943eaf42ebd7f40ade57cf9a18f3da4318dcc2de0a8a7bb0fb01d75aaaa5
                                                                                • Opcode Fuzzy Hash: 07b95502c780bae21d6bfcf35c962c1e838089079ff50143f0c5b16c23f6c154
                                                                                • Instruction Fuzzy Hash: CDE0C975D0530CAFCB44DBA8E445BACBFB4AF84204F0085AAEC05D7351EF341A45CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 910dea9894c37be5695d71a2a5cbe7d0d173be3df105e3812985151edc7c8f1a
                                                                                • Instruction ID: 0b0a3dc42c8c1b05a75d50cd97ed5acd01cd64d32cd957fb3ddcc79f011a9dc8
                                                                                • Opcode Fuzzy Hash: 910dea9894c37be5695d71a2a5cbe7d0d173be3df105e3812985151edc7c8f1a
                                                                                • Instruction Fuzzy Hash: DFE06D317213518FC71AAA38A11486A37E2EF8920530108FBE849C7351DF30EC41C781
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 464842e81b17efeea945a3f18e12e6c180a23e9112e8a7633c4fc0f3db4a5296
                                                                                • Instruction ID: 4543c3af6d962f75e78fb4b96bb256c66aaa1b2e36cddda3ddf65899b5d81cf2
                                                                                • Opcode Fuzzy Hash: 464842e81b17efeea945a3f18e12e6c180a23e9112e8a7633c4fc0f3db4a5296
                                                                                • Instruction Fuzzy Hash: FAE0EC317212189B8759AA7CF11495A77EAEF8961531118BDE80AD7354DE31FC428BC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 77322d97e86a76e647c963142ab6f1a0f955a507ffa8b691bce5a01abbf4d732
                                                                                • Instruction ID: 287ea5d60d4025ab895a3fd131648a90e6325404c3f8688812f0ed56b6e2fea8
                                                                                • Opcode Fuzzy Hash: 77322d97e86a76e647c963142ab6f1a0f955a507ffa8b691bce5a01abbf4d732
                                                                                • Instruction Fuzzy Hash: EDE08634A11249EFCB04EFB8EA1159C7BF4EB4121471180ADD458E7201EA315E069B51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 13d60f0d545b77790be54222971e2c9e4f7d7dc242f04290b7bdb66967ee76fa
                                                                                • Instruction ID: 16bd50f006ccff83ff2ea7b11bc3df953c618330ecda6981782d2ddc270d2b10
                                                                                • Opcode Fuzzy Hash: 13d60f0d545b77790be54222971e2c9e4f7d7dc242f04290b7bdb66967ee76fa
                                                                                • Instruction Fuzzy Hash: C2E09274E0420CAFCB44EFA8D44599DBFB5AB88300F0081A9E819A7350EA746A04CF81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bafc4f6dd0863d583dfa21485f0aebc8f4ea8894f3c598b5e4f6efbc6cc57d25
                                                                                • Instruction ID: 0f784b6f103fbc1d012c3fc5d2b766a1f10df833b555099400f866c88df23ecd
                                                                                • Opcode Fuzzy Hash: bafc4f6dd0863d583dfa21485f0aebc8f4ea8894f3c598b5e4f6efbc6cc57d25
                                                                                • Instruction Fuzzy Hash: ECE04F3091A2C9DFDB02DFB4EA9159D7FB1EB8220572444EEC844E7262DA311E189B41
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: eb352dfdb529ac2ae83387271a531048846ca049d8b831566596d58edc4e5b10
                                                                                • Instruction ID: 626a33b16eecbe60672dc90ab43221ea50071b0ed20dc248be4e28196bda7b9f
                                                                                • Opcode Fuzzy Hash: eb352dfdb529ac2ae83387271a531048846ca049d8b831566596d58edc4e5b10
                                                                                • Instruction Fuzzy Hash: E3D05E34A1020DEFCB08FFA8EA0055DBBF9EB84204B1085ADD419F3200EF316F019B91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 254fcebb60ff1e45840aebe3a5c574bcafdb1e2f2a761213754315fcafbf125f
                                                                                • Instruction ID: e0a39825a5a65f146fe1413d068134388e560731704eca4d6c213419adda6029
                                                                                • Opcode Fuzzy Hash: 254fcebb60ff1e45840aebe3a5c574bcafdb1e2f2a761213754315fcafbf125f
                                                                                • Instruction Fuzzy Hash: 98D05B7091110DEFCB04EFA4EA5155DBBF5FB45604B5045ADD408D7240DE725F009B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 281db5abc906ff270178dfb281d65ffbcd7bcb6a504f2ad1457575726dc449e7
                                                                                • Instruction ID: b09c9c97bfe5418f176145e9597e4d736055b774afd66fa8e1983101a46d9e92
                                                                                • Opcode Fuzzy Hash: 281db5abc906ff270178dfb281d65ffbcd7bcb6a504f2ad1457575726dc449e7
                                                                                • Instruction Fuzzy Hash: 81D0C2B160434447CB195E3CA4093167F99BF83214F68056D95A1C66C2EA72D0028791
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 983035d24f41049c233bbc2b482e4f436a36f68bf82bd76b073b8a5aa1e63c56
                                                                                • Instruction ID: f7ed827ca4a8685bfd121364b9902c8dfe6dd9ec66ed407f141bb46187da7524
                                                                                • Opcode Fuzzy Hash: 983035d24f41049c233bbc2b482e4f436a36f68bf82bd76b073b8a5aa1e63c56
                                                                                • Instruction Fuzzy Hash: C4D05B3091120DEFCB44EFA9DA5159D7BF9EB84205B1041ACD908D3210DE316F009B40
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 010caba732335662171d70c65df8f41fd28b6d07d575a0844240a20e7d8dcf9d
                                                                                • Instruction ID: 070f9524aa949d698c98c7f2f843db74fed3068fd39b682d6a6893a6b1f56d77
                                                                                • Opcode Fuzzy Hash: 010caba732335662171d70c65df8f41fd28b6d07d575a0844240a20e7d8dcf9d
                                                                                • Instruction Fuzzy Hash: 4BD0227040978C5AC210D79C6801F107FA8DB52640F0003DBEC0847322CF265C8087A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 27d07bf5c897fb0c1770502c28557843e67cb895540f6a1febd695c9e26344d9
                                                                                • Instruction ID: e6cffa1489365584b42543b3ebf25cfdddd866c248e7f3894f8039f4d0a51da7
                                                                                • Opcode Fuzzy Hash: 27d07bf5c897fb0c1770502c28557843e67cb895540f6a1febd695c9e26344d9
                                                                                • Instruction Fuzzy Hash: 0AD092751291804FC742CB7489A14607FE1DF4B108329C8EAD4C9CF2A3D662A807DB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ce9c0a0e091813767c8e553219c05ebe9ed47ec2f1810f0b7a5d5189741692ec
                                                                                • Instruction ID: f08d5262e772bdfe61a1ed3f1253fb0a9ec2ca6ee3d5237cc5c5833163fe25b3
                                                                                • Opcode Fuzzy Hash: ce9c0a0e091813767c8e553219c05ebe9ed47ec2f1810f0b7a5d5189741692ec
                                                                                • Instruction Fuzzy Hash: 0CD0677094420ACEDB188B81D4597AE7EB0EB04314F180419D501A5180C7780984CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f26b898bbb400941f14f323e40d2637c9b6a2e1405632dba6965fa97122ec90e
                                                                                • Instruction ID: f543f86fe1783f77a3e6ddd474647442114dc308178301bbc4b81e08fe469c22
                                                                                • Opcode Fuzzy Hash: f26b898bbb400941f14f323e40d2637c9b6a2e1405632dba6965fa97122ec90e
                                                                                • Instruction Fuzzy Hash: 74D06C70A4420ACBEB288B81D0597EEBEB1EB08368F280419D402A5280C7B90988CB92
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b0a07e3c307fa14258e3996d88ab03fd2ca8236722239331ff005646ba1afc85
                                                                                • Instruction ID: 717ae53360355f59368747cbacdd9cb5e44172e75ec6b6bff3854c826530b12b
                                                                                • Opcode Fuzzy Hash: b0a07e3c307fa14258e3996d88ab03fd2ca8236722239331ff005646ba1afc85
                                                                                • Instruction Fuzzy Hash: 3CD06C70A8420ACAEB288B81D1597AEBEB0EB48358F280419D402A5280C7B80988CB92
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 663f0033d90a1d4f8749cb42da5a2c7c46cd5e7689d4aec8651b075c8072c604
                                                                                • Instruction ID: 0e16c70d2a761eb0308b1aa4cc0f3ba9151456f1e9bdfc834cfd80d6a47b4ab5
                                                                                • Opcode Fuzzy Hash: 663f0033d90a1d4f8749cb42da5a2c7c46cd5e7689d4aec8651b075c8072c604
                                                                                • Instruction Fuzzy Hash: 1DD06C70A4420ACEEB288B81D1597AEBEF1EB48318F280419D402A5280C7B80988CB96
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cd6fa88d4a2dc889161357144b5d413a3aded566d16103fdd25d2b204429c47f
                                                                                • Instruction ID: 7134fe2f070a4dbae23ae0fb2ee8d90490a2a06c35716b75481694daeaa12e8c
                                                                                • Opcode Fuzzy Hash: cd6fa88d4a2dc889161357144b5d413a3aded566d16103fdd25d2b204429c47f
                                                                                • Instruction Fuzzy Hash: 8FC0123103C3AA5FC702AB65A4698083F30DA5113530143F6AC24D94E2CD584588E709
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 12620c99db6c98e91ec0ec8994fefca4d38b20db25af084e081e1a2e1ab6b446
                                                                                • Instruction ID: 5cab900b2993ccfb56e921abebeb347b2e3b017639e81257c93b6a0e1b219aad
                                                                                • Opcode Fuzzy Hash: 12620c99db6c98e91ec0ec8994fefca4d38b20db25af084e081e1a2e1ab6b446
                                                                                • Instruction Fuzzy Hash: 78B0927090930CAF8620DA99980185ABBACDA1A210B4001EAEA0887320D972A9109AE1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b490d8829c57312a331500d43ae5cec0487fd6a48e93500846de2c9b8b1276c4
                                                                                • Instruction ID: f717d6eee797a1c4a47f136ddd2776daf6131f0aa0282836a367feb13115f843
                                                                                • Opcode Fuzzy Hash: b490d8829c57312a331500d43ae5cec0487fd6a48e93500846de2c9b8b1276c4
                                                                                • Instruction Fuzzy Hash: 6CC012269093804BCB029B29A9613AA3B706BA1278F0887A8C8B0076D3C3044882EB40
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 85e92dc7170f993082922c7d8ab0ff9bd24b1d82a0f8d4d82042bdf4369b9c61
                                                                                • Instruction ID: ffb8355fa3425e484890c22bc49ed951b2dccebee87cc4f6f58b61ad51df12c1
                                                                                • Opcode Fuzzy Hash: 85e92dc7170f993082922c7d8ab0ff9bd24b1d82a0f8d4d82042bdf4369b9c61
                                                                                • Instruction Fuzzy Hash: 66C04C3AB00049DB8F00DA85F4454DCF731EB8422AF204162D51552510963129578B40
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0e709d7bc25195eda53bdcbc5f04301fe63efb955c8bc33f84e0032d84f758b3
                                                                                • Instruction ID: 470aba0eeae2d3930bdafa24f4fd02ee60659376fe56d3bc07ed68c5c409c78c
                                                                                • Opcode Fuzzy Hash: 0e709d7bc25195eda53bdcbc5f04301fe63efb955c8bc33f84e0032d84f758b3
                                                                                • Instruction Fuzzy Hash: D6C08C3110C0404FC704CB20C8DAF6ABB72AF80301F2E90BDD145C7656CA305C00CB85
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 16d0289966a5d762eeffd55d3141a3b5198767b5a041c9ce806e03a12ec32eb9
                                                                                • Instruction ID: 9142b6a6fd5030cf8dc63108211d2549a2b8228686c764dec8e75cbebc4dcb4f
                                                                                • Opcode Fuzzy Hash: 16d0289966a5d762eeffd55d3141a3b5198767b5a041c9ce806e03a12ec32eb9
                                                                                • Instruction Fuzzy Hash: 8FC04C7660A7808FC7565B2484101953E226B631157D945EDC8545B352CF369D06CF52
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2189548549.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_1460000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2a6062e9cd9a37c2ff203f8bb5f18838f926cb0da2df13b75701abf36e3e6c77
                                                                                • Instruction ID: 670a9f107c6839d8369e5df366dab7d8b17223b74a94e2ae78adc1217e597cce
                                                                                • Opcode Fuzzy Hash: 2a6062e9cd9a37c2ff203f8bb5f18838f926cb0da2df13b75701abf36e3e6c77
                                                                                • Instruction Fuzzy Hash: 44B0123107871F8BD6057B56F4279043F7CE7802057401115B20D0A426DEA82848A688
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219932712.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5890000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4bf652d2188d763c27ec3bef87557072044678f9c9d77aa45e6985b30f466211
                                                                                • Instruction ID: 802c174e0e28aadddd669c45643b3f44eba105ad95b30b003cff0d11c4de4242
                                                                                • Opcode Fuzzy Hash: 4bf652d2188d763c27ec3bef87557072044678f9c9d77aa45e6985b30f466211
                                                                                • Instruction Fuzzy Hash: C7221734701214CFDB19EB38C494A6DB7F2EF89214F5485A9E90ADB3A1DB35ED82CB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2219686950.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_5870000_dMDImIGmc7.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cd91b89da06b0e7ec3f12e156a2329a6492d3357a02b9fda73b98aad13ca195c
                                                                                • Instruction ID: caf3886b709dec7a3c70d76aacb70bb0f0d583ae1d9cc19128e33ef20998e292
                                                                                • Opcode Fuzzy Hash: cd91b89da06b0e7ec3f12e156a2329a6492d3357a02b9fda73b98aad13ca195c
                                                                                • Instruction Fuzzy Hash: 92E12E31E1065E9FCB05DFA8C4405DEFBB1FF99310F25865AE415BB210EB74A986CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 114bc69595475096cd4535ea43290c24a32b27d0067544ef4b754c17e9e6bbdc
                                                                                • Instruction ID: 7cb9096df025cab9aa49f0c141223129f05869e90da614ece18dcc2861cdb92b
                                                                                • Opcode Fuzzy Hash: 114bc69595475096cd4535ea43290c24a32b27d0067544ef4b754c17e9e6bbdc
                                                                                • Instruction Fuzzy Hash: 1A81D074B102158FDB24DB64E968B7EBBF2BF84700F108569E516AB690DF369C85CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9e18f7469f8a847eac10bb00a578a218aa9920d788974be1ee24329d77749564
                                                                                • Instruction ID: 153365b04229c2d645baa2fae1b2f858b6acf44e581cb1bf7fbbafbb1a726aa7
                                                                                • Opcode Fuzzy Hash: 9e18f7469f8a847eac10bb00a578a218aa9920d788974be1ee24329d77749564
                                                                                • Instruction Fuzzy Hash: DF916E35A00616CFCB14DF78E8545AEB7B2FF88310B148659E909AB354EF74ED86CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c0ede355fb32d87dbe4e40dab4a8cf2fbaf9450acf271145deda877a13e69b6e
                                                                                • Instruction ID: fd04b0f36f1bee80522f2bd8d50ecfdb45886ef25ffa237b1bdaec406cdcef18
                                                                                • Opcode Fuzzy Hash: c0ede355fb32d87dbe4e40dab4a8cf2fbaf9450acf271145deda877a13e69b6e
                                                                                • Instruction Fuzzy Hash: 3871B735B00214DFDB149BB5D854AAEBBE7BFC8310F148029E606EB7A5DE749D42CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b732e25b228fa70de31ad085d431fe45987468e339236d6170c61a2f0688564d
                                                                                • Instruction ID: b48d976d619eb97b0275dda663ff846ef2d7612cbcb77e7131f8efcaf356522a
                                                                                • Opcode Fuzzy Hash: b732e25b228fa70de31ad085d431fe45987468e339236d6170c61a2f0688564d
                                                                                • Instruction Fuzzy Hash: 9171E331E153459FE702DBB8D858BCDBFB2EF95300F14915AE104AB292EB749949CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0ba17b7aaa8466fbfaf68f6a2896ccdfc6d3c8481d8e1f22e69cf869e1d6910c
                                                                                • Instruction ID: 952f52919e654c333abdb81c792af0aee460d63db579888f51e5aa16d5930b2f
                                                                                • Opcode Fuzzy Hash: 0ba17b7aaa8466fbfaf68f6a2896ccdfc6d3c8481d8e1f22e69cf869e1d6910c
                                                                                • Instruction Fuzzy Hash: ED510235B00249CFCB15DF78E8546AEBBF6BFC9250B24817ADA09DB355DA308D02CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7da65ae2c241601e7e4e4066110065892f7a16eb5b07f8ab1b41ffb80c95ba63
                                                                                • Instruction ID: 6613d46eb54eee6c9b9a9d4943ce13a8c7ab7811200247ea04d12506e70329cb
                                                                                • Opcode Fuzzy Hash: 7da65ae2c241601e7e4e4066110065892f7a16eb5b07f8ab1b41ffb80c95ba63
                                                                                • Instruction Fuzzy Hash: 445148357002118FDB15DF28E898A6EBBB2AFC83107158169E909DF365DF74ED82CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1438b8a3b089c1e1ff02f4a26ee2b975d5266c0d20bbc73830a096b8a4322642
                                                                                • Instruction ID: 741eaf6535c1e1cdaa429174e2d680f1160d96d953295c8e1d4d56593c175332
                                                                                • Opcode Fuzzy Hash: 1438b8a3b089c1e1ff02f4a26ee2b975d5266c0d20bbc73830a096b8a4322642
                                                                                • Instruction Fuzzy Hash: 5D41F139B012159FEB089B74EC6477E3AE7FBC5300F144429EA06DB795EE348D428794
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3e97b6ee5ba8f6fb55d7002e84d177e415ebd82b73052e0390ff51ae4ecd3dd0
                                                                                • Instruction ID: 9a53bbb01f7ed0901c2357d9a17dbb009659bc7d05fbad5a43151d6effd01c0f
                                                                                • Opcode Fuzzy Hash: 3e97b6ee5ba8f6fb55d7002e84d177e415ebd82b73052e0390ff51ae4ecd3dd0
                                                                                • Instruction Fuzzy Hash: ED517E30E10309DBEB05DFB8E854B9DBBB2FF98300F209519E6046B290DF74A985CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cae6943c27a5c7945ab72889dc60588a9a7812de7e955756e6ccea407258c4a3
                                                                                • Instruction ID: 93b8f0031a05b2b2e0f484d4e945d8122330404181b110892170c9744769d8d3
                                                                                • Opcode Fuzzy Hash: cae6943c27a5c7945ab72889dc60588a9a7812de7e955756e6ccea407258c4a3
                                                                                • Instruction Fuzzy Hash: C73122357092625FDB05DA38AC65BBF3FE7AF81204F14006AE606CB695EE3488458794
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: dd84c407ede533907e5374cc553590a0712e04f514405f1a28160b64737af851
                                                                                • Instruction ID: f01644cc7c396831e09214a380a4bb7adac606228da02ff8d07de9d1bc35dcdf
                                                                                • Opcode Fuzzy Hash: dd84c407ede533907e5374cc553590a0712e04f514405f1a28160b64737af851
                                                                                • Instruction Fuzzy Hash: B641F779B012159FCB54DF68E88499EBBF6FF89310B108169EA05EB361DB31DD42CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 25a869891f3d25affb1b12f9efbfd00a7b908d09b412bc849be2bf8419a3c65b
                                                                                • Instruction ID: f952e6f48ba0eb3d1f8c3aeb7148b22dc833ac7ebf577b7481e7bc7e401f0284
                                                                                • Opcode Fuzzy Hash: 25a869891f3d25affb1b12f9efbfd00a7b908d09b412bc849be2bf8419a3c65b
                                                                                • Instruction Fuzzy Hash: 3B31F6307082549BD715A778E8693BE3AF79BC5300F54846AD602EB782CD794C06C791
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d2350483f2ed0f6dc2f6018e670c71ad4b1308a1bed562c826e0ab4424c38436
                                                                                • Instruction ID: 0078998017a78a403111c0e94706bee630a59476ae1f732ca310251547717a77
                                                                                • Opcode Fuzzy Hash: d2350483f2ed0f6dc2f6018e670c71ad4b1308a1bed562c826e0ab4424c38436
                                                                                • Instruction Fuzzy Hash: 88318534A15214DFEB149B74E8587AE7BF2BF88300F18C029D902AB795DF74A846CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2ada8de3efd3ac561d4a39bc6c0bff823dd8d16a050586b0323d688941a7dd73
                                                                                • Instruction ID: 711a2c7f8ce1c10d35a1fc7d9edd00ada009e7d39efadfd6644518602e12c81e
                                                                                • Opcode Fuzzy Hash: 2ada8de3efd3ac561d4a39bc6c0bff823dd8d16a050586b0323d688941a7dd73
                                                                                • Instruction Fuzzy Hash: 8C317330A14204DFEB149B75EC587AE7BF2BF88304F18C029D902AB795DF74A846CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2b6ae06113816f46828e8106a4129b71e7fff615a7b8f5f0a7b83411c4b55e56
                                                                                • Instruction ID: 67259cad7e1acab6cd9c846a4b35a9c7610f5847463e94ccf3f386496a65f3e6
                                                                                • Opcode Fuzzy Hash: 2b6ae06113816f46828e8106a4129b71e7fff615a7b8f5f0a7b83411c4b55e56
                                                                                • Instruction Fuzzy Hash: D941E378A10208DFCB44DFA9E58499EBBF6FF98310B258069E905E7365CB31AC41CF90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4f3e9f3dae0a016fe6e505a614f329be75c2b004fc1f278ee314b80848b13616
                                                                                • Instruction ID: e475b6cef0bcc8a6bdbaf813b0c68a440b7f1be20ff9863ce2d8a35e70de891e
                                                                                • Opcode Fuzzy Hash: 4f3e9f3dae0a016fe6e505a614f329be75c2b004fc1f278ee314b80848b13616
                                                                                • Instruction Fuzzy Hash: DD31B374A11218DFCB44DFA9E48499EBBF6FF88310B258069E905E7365DB31AC41CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a6bce4134ef6f0d74f0a294089c07e28f2d5b4ef807d6b50b20b909c9ecdb641
                                                                                • Instruction ID: 1a9d83fbe6b968f99876ac499c6fa07722f1ef59aed730d371cf2cda4747f6a5
                                                                                • Opcode Fuzzy Hash: a6bce4134ef6f0d74f0a294089c07e28f2d5b4ef807d6b50b20b909c9ecdb641
                                                                                • Instruction Fuzzy Hash: 7C21CD366093596FDF1122B07C28BFE3F92DF42260F06807FEF488B552D924844AC391
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0d06658453378117dd9c4f3662190b3a3cd467813204cbab52aa8b371990cfe0
                                                                                • Instruction ID: fdcf949c46a4c17982870500ff031127d37fce05f21cf8f8ab30000c70b3fdf4
                                                                                • Opcode Fuzzy Hash: 0d06658453378117dd9c4f3662190b3a3cd467813204cbab52aa8b371990cfe0
                                                                                • Instruction Fuzzy Hash: F921FF79B012565FDB58DB38AC69BBF3BE7BFC4204F24402DE606CB694EB3489068750
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: aa6545016d0848b2df446a49e4ea84c00b53fc8712acff4b64d1b8dc95655141
                                                                                • Instruction ID: 2866e7e0b23d3128074511ea69bffda2fa77b42175cfabdc2e93a519dfacc46c
                                                                                • Opcode Fuzzy Hash: aa6545016d0848b2df446a49e4ea84c00b53fc8712acff4b64d1b8dc95655141
                                                                                • Instruction Fuzzy Hash: 5A2149357093148BD7255A21B898BBE3B97FFD5650F18843AEE098B790CE388846C755
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b202a790ab5d1f5f406c46bd9a3aa19c15df9d4e7ee40d36aa0e67cb3b4ef4e0
                                                                                • Instruction ID: 94bd05bf4055900007bf6f8c4969a84b53f54153ef69fa6963dbdf1c1778d9a1
                                                                                • Opcode Fuzzy Hash: b202a790ab5d1f5f406c46bd9a3aa19c15df9d4e7ee40d36aa0e67cb3b4ef4e0
                                                                                • Instruction Fuzzy Hash: 37219331B112099BEB04CB61E5597FE7BB7EF88700F108419EA02A7680DF745D46CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7074e445dbba6da6d0fee33965b01b02e5efe337dac8e5d2f8bf9325b715864b
                                                                                • Instruction ID: 73d3861ea59beab50696a6f59dc6cb99f485e6a623854ce35c4c23397acb7a41
                                                                                • Opcode Fuzzy Hash: 7074e445dbba6da6d0fee33965b01b02e5efe337dac8e5d2f8bf9325b715864b
                                                                                • Instruction Fuzzy Hash: E6215270B152499BEB14DB61E5596AEBBB7EF84600F10C419E602AB280DF745D46CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ee67666b5352e2f6a8a9a3a9d024183219302dfbe24953a0b5843c0798286676
                                                                                • Instruction ID: bfadda04a584303d83791b69d8005a2b930c130957d7be7feee225f925ba6141
                                                                                • Opcode Fuzzy Hash: ee67666b5352e2f6a8a9a3a9d024183219302dfbe24953a0b5843c0798286676
                                                                                • Instruction Fuzzy Hash: 2E21C530B042049FCB04DB64EC95AEE7FB3AF8D320F144419E605AB791DE799846CB95
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8568542dda6571c5ba72c3eed1b2cbc214d1f658f30d7aabd4d65a5b41db8bb7
                                                                                • Instruction ID: 4f87e83847d208120bde732df5f796ed1de80a82fedae44c41d2d4b29ccfc8e9
                                                                                • Opcode Fuzzy Hash: 8568542dda6571c5ba72c3eed1b2cbc214d1f658f30d7aabd4d65a5b41db8bb7
                                                                                • Instruction Fuzzy Hash: FD114C397253262BEB187174FC6637F2ADB8BC1610F44047AEA06CBF82DC948C0A0396
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0260df509a5cf99fa8188c30896d0d91e3ee3693f61f6b9c83508e47774b615a
                                                                                • Instruction ID: ed0e6d941a1ee9c7da30d8a394fa7f53aba9f28823df36d2eb80707f8ff7f4e1
                                                                                • Opcode Fuzzy Hash: 0260df509a5cf99fa8188c30896d0d91e3ee3693f61f6b9c83508e47774b615a
                                                                                • Instruction Fuzzy Hash: B821E775E00218AFCB44DF69E8849DEBBF2FF9C710B108129E905EB361DB319941CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 01aeb2e7b2793c2c9003c57551069b6f822dceecfae343629ebe3aaad6cdf063
                                                                                • Instruction ID: 4c54996fa3f87e77bcab25bdd73897c3a83fbe2a73a8a087a9edba0acb70b07e
                                                                                • Opcode Fuzzy Hash: 01aeb2e7b2793c2c9003c57551069b6f822dceecfae343629ebe3aaad6cdf063
                                                                                • Instruction Fuzzy Hash: E6113A39B056494BCF14C6A8EC106EE7BF6AF89214F4840BAC204B7695D6359C45C7A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 723bca202aff26ad12337a3ce3eec56238255f10e10ec50cdfe56e6cbaae336e
                                                                                • Instruction ID: e6a3afe5f654c2be7dea58acbfb0a7941ede6820c83d684b04e0f69bb8b142eb
                                                                                • Opcode Fuzzy Hash: 723bca202aff26ad12337a3ce3eec56238255f10e10ec50cdfe56e6cbaae336e
                                                                                • Instruction Fuzzy Hash: 4C216330B10204EFDB14DB65E895AED7BB7EF9C320F104019E609AB780CF79684ACB95
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5b1f4aee78358d1ac1750b8fcad414f17a5c810318df330cb793321aeeee13c5
                                                                                • Instruction ID: 43b0086b89c8fb7aa7cce3a1da338f481d0f813e34c66865ecb0ac0ad68b4eef
                                                                                • Opcode Fuzzy Hash: 5b1f4aee78358d1ac1750b8fcad414f17a5c810318df330cb793321aeeee13c5
                                                                                • Instruction Fuzzy Hash: 6B116030B10204DFCB04DB65EC55AEE7BB3AF8C320F148024E609AB790CE799846CB94
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c98636dd58aaac002ef6bf7dc118252fba022c67dc965ac6e0879680dddce835
                                                                                • Instruction ID: 6949222a6f62a4101ee9f3a8a90352d1b7a11adeed1afa3e592555568c662dc3
                                                                                • Opcode Fuzzy Hash: c98636dd58aaac002ef6bf7dc118252fba022c67dc965ac6e0879680dddce835
                                                                                • Instruction Fuzzy Hash: 84114F30B10204EFCB14DB65E895AED7BB7AF9C320F104019E609AB781CF79584ACB99
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f7564545f3fb9faf4bb5ff6df271c9e1e7df1765154050a1ddd38b43f7afd982
                                                                                • Instruction ID: 7305d1243e08348d702e5817f76f1476471adbbcf1b7244b155080ebadc1f816
                                                                                • Opcode Fuzzy Hash: f7564545f3fb9faf4bb5ff6df271c9e1e7df1765154050a1ddd38b43f7afd982
                                                                                • Instruction Fuzzy Hash: EB21F071904249CFEB20DFAAC885A9EFBB4FF88224F148429D559A7200CB796945CBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6c534f1336bdafd91df3714314bcd9ae6e70756e99276b33a72fa848f8316c88
                                                                                • Instruction ID: 1cbe0800a3f2cd1c95f7e3f00ad18d3e827f84695d6eeafe7502795933ae0599
                                                                                • Opcode Fuzzy Hash: 6c534f1336bdafd91df3714314bcd9ae6e70756e99276b33a72fa848f8316c88
                                                                                • Instruction Fuzzy Hash: 1001C43AB001198BDF18DAA9EC106EEB7F6FF8C315F04403AD605B7654DB399945C7A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: aa83fc65d942fce7d8ac480195efd997b4ede27be87db8a4286a1680039c95df
                                                                                • Instruction ID: 7a2c6199b79677d7e2ea7439fb55331af223866a06fa50c24278ed56f8063c85
                                                                                • Opcode Fuzzy Hash: aa83fc65d942fce7d8ac480195efd997b4ede27be87db8a4286a1680039c95df
                                                                                • Instruction Fuzzy Hash: 640171363051108B8648D66DF4948AEB7ABFBD8661314803AF60ACB350CE32DC428B94
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d03e4d6d014669bde2124183888b1b2ed331e7a6d99ed02de226d2af3eff6632
                                                                                • Instruction ID: 24bb70b2d1b541081436a532d66bc304a1ab643a3197f993bb8acb5249acaf41
                                                                                • Opcode Fuzzy Hash: d03e4d6d014669bde2124183888b1b2ed331e7a6d99ed02de226d2af3eff6632
                                                                                • Instruction Fuzzy Hash: 1311E371D04249CFDB20DFAAC485B9EFBF4FF88624F108419D519A7240CB796945CFA5
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 78371d2c4d406b285f1a6a01055b56b299bea1c0ca19ac64518bf09b326097d9
                                                                                • Instruction ID: 049182948f4ca48a5177501db196e97536274e4018b225e6145a4a83ee4e7e2c
                                                                                • Opcode Fuzzy Hash: 78371d2c4d406b285f1a6a01055b56b299bea1c0ca19ac64518bf09b326097d9
                                                                                • Instruction Fuzzy Hash: DA113031610204DFCB14DB64DC99AADBFB6EF8C325F244019E909AB340CF795846CB99
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5ba008830644a0c86c59de0ff011bb91ed66adc861f51524246d44ca8811a4e1
                                                                                • Instruction ID: 44b1240cd5524311c7835e569db86711511d51fb8d2aa76a55a16a2145655e71
                                                                                • Opcode Fuzzy Hash: 5ba008830644a0c86c59de0ff011bb91ed66adc861f51524246d44ca8811a4e1
                                                                                • Instruction Fuzzy Hash: B4019E317042048BDB58EAB9D4687EF7AF3AFC8700F60846DD506EB790CE764D068B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a4c3128abb3dd4217740b9fb69396fa63db529344ac461935bf3004295151e36
                                                                                • Instruction ID: ac3e360c4388ae16c348545d6c5ea280b4d409ca40b42994f7e13071cb3aae4a
                                                                                • Opcode Fuzzy Hash: a4c3128abb3dd4217740b9fb69396fa63db529344ac461935bf3004295151e36
                                                                                • Instruction Fuzzy Hash: A8F02D32B082209BD71557A47C697FD6762DBD1310F48815AC745ABFE5DA679883C380
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 318f371df4a79a51d83746bb6dacc158515631551ffade7babeb32febad538cf
                                                                                • Instruction ID: 70057bf5106ae414fc6e72b31929d30354510f7d5c4413fc9ce10667451abf37
                                                                                • Opcode Fuzzy Hash: 318f371df4a79a51d83746bb6dacc158515631551ffade7babeb32febad538cf
                                                                                • Instruction Fuzzy Hash: 5101D631B0411497DB18AA68E9697EF7AF79BC8700F54442DD202F7781CE755D02C7D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 188cec6692419b716b6113621756405724562d341fd09af45026042009b5679c
                                                                                • Instruction ID: adcb48b9da7443e2bf5f6c066f92c85cebe17ba77f8e013cdb8cfdd42964bec6
                                                                                • Opcode Fuzzy Hash: 188cec6692419b716b6113621756405724562d341fd09af45026042009b5679c
                                                                                • Instruction Fuzzy Hash: DD018F3170420497DB58AA6AD8287AF7AF79FC8350F60846DD606A7790CE764D068BD1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2196500183.0000000004C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C5D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_4c5d000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d9b98cb38a3fd694f51e2efdeabeb1153a08e36ee01da15dd2439c9cd9b0da28
                                                                                • Instruction ID: 8bc3725268f75d18436fa65b02c3f46837d91b811531d5a8ead068316f53a2e0
                                                                                • Opcode Fuzzy Hash: d9b98cb38a3fd694f51e2efdeabeb1153a08e36ee01da15dd2439c9cd9b0da28
                                                                                • Instruction Fuzzy Hash: DA01526140E3C09FE7128B259994756BFB4DF43624F19C1DBDD888F1A3C26D5889C772
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2196500183.0000000004C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C5D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_4c5d000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b140b463d1b7e4672980055969bb0341674b76cdcbe8119e6d933d497fd6f718
                                                                                • Instruction ID: 63cc60bea45a35e438fda759559239f8d4c4259adf8360a4f948e81cc7d9faba
                                                                                • Opcode Fuzzy Hash: b140b463d1b7e4672980055969bb0341674b76cdcbe8119e6d933d497fd6f718
                                                                                • Instruction Fuzzy Hash: 5E01F771504340DAE7204E26E984B6ABF88DFC1724F08C01AED0A4A262CAB9A5C1C6B5
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 57353bb33ec2f8f37b51db66624f1bf709ba6155a47fad0c703800b57ee6e761
                                                                                • Instruction ID: 3503daa790376d6933af52344ace2b05389afd52c169824078e447a506c1d96d
                                                                                • Opcode Fuzzy Hash: 57353bb33ec2f8f37b51db66624f1bf709ba6155a47fad0c703800b57ee6e761
                                                                                • Instruction Fuzzy Hash: 8701D630A193458FC71D5F74ECB162D3FA5AFC121071518A9DB46CF250ED189405C791
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 29e9c5c0d118f295671d379fb0f4f73d73a9a7f3103f2cae12b08cf247b27723
                                                                                • Instruction ID: 08aad52cdff043dc3b8ad9bd9a2654a4b7ecdc8679af3f8ae931d3aed77c709a
                                                                                • Opcode Fuzzy Hash: 29e9c5c0d118f295671d379fb0f4f73d73a9a7f3103f2cae12b08cf247b27723
                                                                                • Instruction Fuzzy Hash: C4F06D323003105BD7259A6EF8949AFBFEBEBD4650740852EE605CB650DFA6A8098B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0e2760b4f8bdce406ba0bc1e1045e03ef00701d22844f5b76872754707f096bc
                                                                                • Instruction ID: 6da43ab393b95e9cb373e656838038c462abeb7fa4ad18e03582a6c133184773
                                                                                • Opcode Fuzzy Hash: 0e2760b4f8bdce406ba0bc1e1045e03ef00701d22844f5b76872754707f096bc
                                                                                • Instruction Fuzzy Hash: 16F0E93630531057C734D916B8D4F7FB7DBBBD4D10F044429FB0687A80DA2498068795
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2f66c10a87c1a6e937e700cc77fc69b24322a7bb71a4afaa386b644664e13dda
                                                                                • Instruction ID: b85aa866e781ce41474c3fd8b48ef3eecddcb1f1c42387ca906d8d7c28efb0e3
                                                                                • Opcode Fuzzy Hash: 2f66c10a87c1a6e937e700cc77fc69b24322a7bb71a4afaa386b644664e13dda
                                                                                • Instruction Fuzzy Hash: 54F08C313003105792259A5EF8948AFBFEBEBD4660340812EEB09CB750EFB5A8054BE4
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2580d33a96bd8cc682004fce958ef061241925e82432ab82813d8ab3fcfbceb4
                                                                                • Instruction ID: 2d67c4c390e65267cef8178fb92b6e530b9a325ce50989dab0308318da76a227
                                                                                • Opcode Fuzzy Hash: 2580d33a96bd8cc682004fce958ef061241925e82432ab82813d8ab3fcfbceb4
                                                                                • Instruction Fuzzy Hash: E4F09030A153058AD71CAF78FCA662E3FDAAFC0210B14186DAF06CE240FE289500C7C5
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 745631f1f2fc55613c43df1fa75db7d401e6aef61c732214421dae13def9df17
                                                                                • Instruction ID: 52fbb97d838724a5bdcd6aeb0fa5dfe8c8e31d3e73ef2224b311744f2c836033
                                                                                • Opcode Fuzzy Hash: 745631f1f2fc55613c43df1fa75db7d401e6aef61c732214421dae13def9df17
                                                                                • Instruction Fuzzy Hash: 9DF05C323093405FC3019A69E840947BB66DBDA224F1400BAE508C7356CD359845CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 270c2b95564d3e0f3e5cbdf80498c51c917e26dcec314edccebf223a19642554
                                                                                • Instruction ID: f99707df6b1b51c24a19920255a454d3063d47723eef0a2afa6a234133dca18a
                                                                                • Opcode Fuzzy Hash: 270c2b95564d3e0f3e5cbdf80498c51c917e26dcec314edccebf223a19642554
                                                                                • Instruction Fuzzy Hash: 29E0E524725B561BDB2921A4BC257AF2EDE1B52650F4200B7E681C7F93E5C0C84A13A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ddc31cd5d6e419d5f8d02dcb71b5c9ba32eefcc1855d6453f49fc6b446671b2e
                                                                                • Instruction ID: b3f6a058daff81f9a244a36fe3baa9c9bb7cd168bdfeeca3f83603bd4daa1088
                                                                                • Opcode Fuzzy Hash: ddc31cd5d6e419d5f8d02dcb71b5c9ba32eefcc1855d6453f49fc6b446671b2e
                                                                                • Instruction Fuzzy Hash: 50E026327052009BC314A96AF840957F39BEBC9624B10407DE50CC7315CD32AC428A90
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 38a7dae117afe1c1fa522c1817720e467795a74c8687e0f63afb9977b49bc14c
                                                                                • Instruction ID: 987703b7fdec8dd61ff068acedc3475e233fc824257c17e318b9f69f1ae1852d
                                                                                • Opcode Fuzzy Hash: 38a7dae117afe1c1fa522c1817720e467795a74c8687e0f63afb9977b49bc14c
                                                                                • Instruction Fuzzy Hash: 61E04F30901208EFDB40DF6CE98279EBFF5EB94204F1049989908E7250EF35AA449B44
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 37b766e236c90bee78fa39a0d06d2954b4e423ede9fb0bb76b627daea403dfcc
                                                                                • Instruction ID: 159f929d0d3b8f80390a6d9af75d5ab900126e128ee750cba01a21809dcd2da8
                                                                                • Opcode Fuzzy Hash: 37b766e236c90bee78fa39a0d06d2954b4e423ede9fb0bb76b627daea403dfcc
                                                                                • Instruction Fuzzy Hash: A3D05E3BA2022577CA04A064FC577BE768DC744020F040471AB09CAA06E868880403C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a7840f05c7bb6e150fa5e117cb9692a51b526874b1f3bfa61d63cb2587f0dad9
                                                                                • Instruction ID: 3dbf82842e9b92b18874a1ef62b39777469ca0641c714f0b0cf1c68ea24fc435
                                                                                • Opcode Fuzzy Hash: a7840f05c7bb6e150fa5e117cb9692a51b526874b1f3bfa61d63cb2587f0dad9
                                                                                • Instruction Fuzzy Hash: 07E04F72D09248DFCB41DBA4EA456AD7BB1DB9530471005EAD808E7251EA345F04DB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 36ed150f5e04be17a83f275ef339d6704d6ae34f01e256f71d5264e3d6f9e27e
                                                                                • Instruction ID: f1189beb722c8b4a0292d046d0c569fd00d201eb53ece0819bf073a5504410f6
                                                                                • Opcode Fuzzy Hash: 36ed150f5e04be17a83f275ef339d6704d6ae34f01e256f71d5264e3d6f9e27e
                                                                                • Instruction Fuzzy Hash: 51D05E3B2490444BD3056710E56A6E93F669768221B284067EA5187751CA2A4912C790
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ecd2c1ddae37b59fc7bb039f86b738d679bcd265a5d8f598be9b8ce4f1a67d98
                                                                                • Instruction ID: a45bbc25f86d38a85b445451f0e97014b0f9e7072ee7c2834985693eae09db00
                                                                                • Opcode Fuzzy Hash: ecd2c1ddae37b59fc7bb039f86b738d679bcd265a5d8f598be9b8ce4f1a67d98
                                                                                • Instruction Fuzzy Hash: 73D0A73235411C9B42046B19F89986E7BAAEBA82603604427FB0287610CD615C0587D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ab789656e6dc9b9f395d1af5539deab8cd3f51d6055566d7491f0cfa66260126
                                                                                • Instruction ID: 3db28be3dbd397e2ac147da35cca8d3a25a3389a36f775a6d0b7e297cb27e9ad
                                                                                • Opcode Fuzzy Hash: ab789656e6dc9b9f395d1af5539deab8cd3f51d6055566d7491f0cfa66260126
                                                                                • Instruction Fuzzy Hash: 26D01730A0120CEB8B04DFACE98156DBFBAEB84214B1045AC9908E7250EF326E409B84
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f9a521b77d1eab2977394064311c5addea4481dde902361be31a9bb388dde474
                                                                                • Instruction ID: 4c6ab92bd656b22f23e65fab97e60ec1ea846878a2ce90a00aead789994eb144
                                                                                • Opcode Fuzzy Hash: f9a521b77d1eab2977394064311c5addea4481dde902361be31a9bb388dde474
                                                                                • Instruction Fuzzy Hash: F5D05E70A0120DEFCB00DFA8EA4555DBBFAEB88304B1049ADE908E7250EF316F009B80
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000003.2195713247.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_3_50f0000_rundll32.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 25f5df67ff14a34285dc80fbd0269ea2a316828d10d805ba3ea0463269ca1468
                                                                                • Instruction ID: e63a220d934df7c3226d08b3228c692527610ca7707b059d62ef1a07b6d14e2e
                                                                                • Opcode Fuzzy Hash: 25f5df67ff14a34285dc80fbd0269ea2a316828d10d805ba3ea0463269ca1468
                                                                                • Instruction Fuzzy Hash: 56C09B324641006FDB105A40DD477997B71E775315FA44A38F084D4251C73E4566DE18

                                                                                Execution Graph

                                                                                Execution Coverage:10.7%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:4%
                                                                                Total number of Nodes:223
                                                                                Total number of Limit Nodes:15
                                                                                execution_graph 37060 4f81ed8 37061 4f81f2c ConnectNamedPipe 37060->37061 37062 4f81f68 37061->37062 37063 4f82d98 37064 4f82daa 37063->37064 37065 4f82dee 37064->37065 37067 4f83200 37064->37067 37069 4f8323b 37067->37069 37068 4f83680 37069->37068 37072 10b7481 37069->37072 37076 10b7490 37069->37076 37073 10b74ba 37072->37073 37074 10b74d5 37073->37074 37075 10bf910 3 API calls 37073->37075 37074->37069 37075->37074 37077 10b74ba 37076->37077 37078 10b74d5 37077->37078 37079 10bf910 3 API calls 37077->37079 37078->37069 37079->37078 37080 4f822c8 37081 4f8230a 37080->37081 37082 4f82310 WaitNamedPipeW 37080->37082 37081->37082 37083 4f82344 37082->37083 37084 5332b40 37085 5332b9a 37084->37085 37086 5332bf9 RegDisablePredefinedCache 37085->37086 37087 5332bdc 37085->37087 37086->37087 37088 10b1238 37089 10b1249 37088->37089 37095 10b0e69 37089->37095 37101 10b0e24 37089->37101 37107 10b0e65 37089->37107 37113 10b0e61 37089->37113 37090 10b1282 37096 10b0e4e 37095->37096 37097 10b0e9e 37096->37097 37119 10b36a0 37096->37119 37126 10b36b0 37096->37126 37098 10b133b 37098->37090 37103 10b0e25 37101->37103 37102 10b0e9e 37103->37102 37105 10b36a0 4 API calls 37103->37105 37106 10b36b0 4 API calls 37103->37106 37104 10b133b 37104->37090 37105->37104 37106->37104 37109 10b0e4e 37107->37109 37108 10b0e9e 37109->37108 37111 10b36a0 4 API calls 37109->37111 37112 10b36b0 4 API calls 37109->37112 37110 10b133b 37110->37090 37111->37110 37112->37110 37115 10b0e4e 37113->37115 37114 10b0e9e 37115->37114 37117 10b36a0 4 API calls 37115->37117 37118 10b36b0 4 API calls 37115->37118 37116 10b133b 37116->37090 37117->37116 37118->37116 37120 10b36a3 37119->37120 37122 10b36cc 37119->37122 37120->37122 37133 10b4c63 37120->37133 37121 10b3739 37121->37098 37122->37098 37123 10b3764 37122->37123 37138 10be5c1 37122->37138 37123->37098 37127 10b36c6 37126->37127 37131 10b4c63 RtlGetVersion 37127->37131 37128 10b3764 37128->37098 37129 10b3739 37129->37098 37130 10b36cc 37130->37098 37130->37128 37132 10be5c1 3 API calls 37130->37132 37131->37130 37132->37129 37134 10b4c90 37133->37134 37135 10b4cc6 37134->37135 37136 10b4d1d RtlGetVersion 37134->37136 37135->37122 37137 10b4dda 37136->37137 37137->37122 37139 10be5c4 37138->37139 37140 10be60e 37139->37140 37143 10bea88 37139->37143 37147 10bea77 37139->37147 37140->37121 37144 10bea8b 37143->37144 37145 10beae6 37144->37145 37151 10beb31 37144->37151 37145->37140 37148 10bea7c 37147->37148 37149 10beae6 37148->37149 37150 10beb31 3 API calls 37148->37150 37149->37140 37150->37149 37152 10beb34 37151->37152 37157 10bf768 37152->37157 37153 10bee0f 37154 10bed97 37154->37153 37161 37c0988 37154->37161 37158 10bf793 37157->37158 37159 10bf78c 37157->37159 37158->37154 37159->37158 37160 10bf910 3 API calls 37159->37160 37160->37158 37162 37c098b 37161->37162 37163 37c0448 3 API calls 37162->37163 37164 37c09c5 37163->37164 37164->37154 36923 4f80afc 36924 4f80690 36923->36924 36925 4f8071d 36924->36925 36927 37c6670 36924->36927 36928 37c6674 36927->36928 36931 37c0448 36928->36931 36930 37c66cb 36930->36925 36932 37c046e 36931->36932 36935 4f80eb0 36931->36935 36939 4f80ea0 36931->36939 36932->36930 36936 4f80eb3 36935->36936 36937 4f80ee5 36936->36937 36943 4f80ef0 36936->36943 36937->36932 36940 4f80eb0 36939->36940 36941 4f80ee5 36940->36941 36942 4f80ef0 3 API calls 36940->36942 36941->36932 36942->36941 36944 4f80f00 36943->36944 36948 4f81120 36944->36948 36956 4f81111 36944->36956 36945 4f80f58 36945->36937 36949 4f81147 36948->36949 36950 4f81232 CreateNamedPipeW 36949->36950 36951 4f811c8 36949->36951 36955 4f812f9 36950->36955 36964 4f802f4 36951->36964 36955->36945 36957 4f81147 36956->36957 36958 4f81232 CreateNamedPipeW 36957->36958 36959 4f811c8 36957->36959 36963 4f812f9 36958->36963 36960 4f802f4 CreateNamedPipeW 36959->36960 36961 4f81228 36960->36961 36961->36945 36963->36945 36965 4f81248 CreateNamedPipeW 36964->36965 36967 4f81228 36965->36967 36967->36945 36968 37c5ea8 36971 37c5eab 36968->36971 36969 37c5ed5 36970 37c5ecc 36970->36969 36973 37c64d8 3 API calls 36970->36973 36971->36970 36974 37c64d8 36971->36974 36973->36970 36975 37c64fb 36974->36975 36976 37c650b 36974->36976 36977 37c6504 36975->36977 36979 10bf910 3 API calls 36975->36979 36980 10bf910 36976->36980 36977->36970 36979->36975 36981 10bf943 36980->36981 36983 10bf933 36980->36983 36981->36983 36987 10bf910 3 API calls 36981->36987 36994 10ba4b8 36981->36994 37000 10ba4c8 36981->37000 37006 37c4820 36981->37006 37012 37c4793 36981->37012 37019 37c4830 36981->37019 37025 10bfa98 36981->37025 36982 10bf93c 36982->36975 36983->36982 36991 37c4830 3 API calls 36983->36991 36992 37c4820 3 API calls 36983->36992 36993 37c4793 3 API calls 36983->36993 36987->36983 36991->36983 36992->36983 36993->36983 36996 10ba4c8 36994->36996 36995 10ba4ed 36995->36983 36996->36995 36997 37c4830 3 API calls 36996->36997 36998 37c4820 3 API calls 36996->36998 36999 37c4793 3 API calls 36996->36999 36997->36995 36998->36995 36999->36995 37001 10ba4f9 37000->37001 37002 10ba4ed 37000->37002 37001->37002 37003 37c4830 3 API calls 37001->37003 37004 37c4820 3 API calls 37001->37004 37005 37c4793 3 API calls 37001->37005 37002->36983 37003->37002 37004->37002 37005->37002 37008 37c4828 37006->37008 37007 37c485d 37007->36983 37009 37c4854 37008->37009 37011 10bf910 3 API calls 37008->37011 37009->37007 37010 37c6670 3 API calls 37009->37010 37010->37007 37011->37009 37013 37c479b 37012->37013 37014 37c47bb 37012->37014 37013->37014 37016 37c4854 37013->37016 37018 10bf910 3 API calls 37013->37018 37014->36983 37015 37c485d 37015->36983 37016->37015 37017 37c6670 3 API calls 37016->37017 37017->37015 37018->37016 37021 37c4864 37019->37021 37022 37c4854 37019->37022 37020 37c485d 37020->36983 37024 10bf910 3 API calls 37021->37024 37022->37020 37023 37c6670 3 API calls 37022->37023 37023->37020 37024->37022 37026 10bfabb 37025->37026 37027 10bfacb 37025->37027 37028 10bfac4 37026->37028 37035 10bff51 37026->37035 37040 10bff20 37026->37040 37045 10bff61 37026->37045 37050 10bff09 37026->37050 37027->37026 37033 10bfa98 3 API calls 37027->37033 37034 10bf910 3 API calls 37027->37034 37028->36983 37033->37026 37034->37026 37036 10bff5d 37035->37036 37038 37c0448 3 API calls 37036->37038 37055 37c0438 37036->37055 37037 10bffb1 37037->37028 37038->37037 37041 10bff23 37040->37041 37043 37c0448 3 API calls 37041->37043 37044 37c0438 3 API calls 37041->37044 37042 10bffb1 37042->37028 37043->37042 37044->37042 37046 10bff63 37045->37046 37048 37c0448 3 API calls 37046->37048 37049 37c0438 3 API calls 37046->37049 37047 10bffb1 37047->37028 37048->37047 37049->37047 37051 10bff20 37050->37051 37053 37c0448 3 API calls 37051->37053 37054 37c0438 3 API calls 37051->37054 37052 10bffb1 37052->37028 37053->37052 37054->37052 37056 37c043b 37055->37056 37057 37c046e 37055->37057 37056->37057 37058 4f80eb0 3 API calls 37056->37058 37059 4f80ea0 3 API calls 37056->37059 37057->37037 37058->37057 37059->37057 37165 4f80040 37166 4f80093 CreateProcessAsUserW 37165->37166 37168 4f80124 37166->37168 37169 4f82100 37170 4f8211e 37169->37170 37172 4f82137 37170->37172 37175 4f8225a 37170->37175 37173 4f8225a 2 API calls 37173->37172 37177 4f8226d 37175->37177 37180 5330380 37177->37180 37185 533036f 37177->37185 37181 5330393 37180->37181 37190 53303c4 37181->37190 37194 53303d0 37181->37194 37186 533037a 37185->37186 37188 53303d0 CreateFileA 37186->37188 37189 53303c4 CreateFileA 37186->37189 37187 4f82160 37187->37173 37188->37187 37189->37187 37192 53303cf CreateFileA 37190->37192 37193 5330505 37192->37193 37196 533042e CreateFileA 37194->37196 37197 5330505 37196->37197

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 301 4f81120-4f811a6 310 4f811a8-4f811aa 301->310 311 4f811b1-4f811bd 301->311 310->311 313 4f811c8-4f811ca 311->313 314 4f811bf-4f811c6 311->314 316 4f811d8-4f81200 313->316 314->313 315 4f811cc-4f811d3 314->315 317 4f81232-4f8128a 315->317 318 4f811d5 315->318 321 4f81209 316->321 322 4f81202-4f81207 316->322 324 4f8128c-4f8128f 317->324 325 4f81292-4f812f7 CreateNamedPipeW 317->325 318->316 323 4f8120e-4f81223 call 4f802f4 321->323 322->323 327 4f81228-4f8122f 323->327 324->325 329 4f812f9-4f812ff 325->329 330 4f81300-4f81321 325->330 329->330
                                                                                APIs
                                                                                • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 04F812E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 2489174969-0
                                                                                • Opcode ID: d8bccacc988c6fceac3021a88bc487cf284e9098c9995dba6fbea407dbf097f9
                                                                                • Instruction ID: 7953ebc2bc869ef9f7d7f52dc01596c640d8d657d6d7edd853d8998b14ad82f9
                                                                                • Opcode Fuzzy Hash: d8bccacc988c6fceac3021a88bc487cf284e9098c9995dba6fbea407dbf097f9
                                                                                • Instruction Fuzzy Hash: DE61AE71A003499FDB10DFA9D944BAEBBF6FF88310F14806EE508EB291D774A906CB50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 412 4f80040-4f80091 413 4f8009c-4f800a0 412->413 414 4f80093-4f80099 412->414 415 4f800a8-4f800bd 413->415 416 4f800a2-4f800a5 413->416 414->413 417 4f800cb-4f80122 CreateProcessAsUserW 415->417 418 4f800bf-4f800c8 415->418 416->415 419 4f8012b-4f80153 417->419 420 4f80124-4f8012a 417->420 418->417 420->419
                                                                                APIs
                                                                                • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 04F8010F
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcessUser
                                                                                • String ID:
                                                                                • API String ID: 2217836671-0
                                                                                • Opcode ID: 12eed81ea1d2942b518a0d0e373005eb95ee8a40d4c1a360cd33cf294472a7a4
                                                                                • Instruction ID: 6dd7052fc80dbf2f9274124dac3625d169b43766bcd36811e2056ffad50d37a3
                                                                                • Opcode Fuzzy Hash: 12eed81ea1d2942b518a0d0e373005eb95ee8a40d4c1a360cd33cf294472a7a4
                                                                                • Instruction Fuzzy Hash: 5A41137690020ADFDF10CFA9C884ADEBBF5FF48320F15852AE918AB250D775A955CF90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 333 53303c4-53303cd 334 53303cf-53303eb 333->334 335 53303ed-533042c 333->335 334->335 336 5330480-5330503 CreateFileA 335->336 337 533042e-5330453 335->337 344 5330505-533050b 336->344 345 533050c-533054a 336->345 337->336 340 5330455-5330457 337->340 342 533047a-533047d 340->342 343 5330459-5330463 340->343 342->336 346 5330467-5330476 343->346 347 5330465 343->347 344->345 352 533055a 345->352 353 533054c-5330550 345->353 346->346 348 5330478 346->348 347->346 348->342 355 533055b 352->355 353->352 354 5330552 353->354 354->352 355->355
                                                                                APIs
                                                                                • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 053304ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4059807913.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_5330000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: e29c4690992d2fc6e0004a1f8986ea787b2a450f3381054fbbcfb0cdb1eb065c
                                                                                • Instruction ID: 53d171a4425f89045063b1532edf4217621dc12fec71a3ef6823e9177b8ebb9c
                                                                                • Opcode Fuzzy Hash: e29c4690992d2fc6e0004a1f8986ea787b2a450f3381054fbbcfb0cdb1eb065c
                                                                                • Instruction Fuzzy Hash: EA5166B1D00349DFDB14CFA9C989B9EBBF2BF48304F248129E809AB251D7B59945CF81

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 356 53303d0-533042c 357 5330480-5330503 CreateFileA 356->357 358 533042e-5330453 356->358 365 5330505-533050b 357->365 366 533050c-533054a 357->366 358->357 361 5330455-5330457 358->361 363 533047a-533047d 361->363 364 5330459-5330463 361->364 363->357 367 5330467-5330476 364->367 368 5330465 364->368 365->366 373 533055a 366->373 374 533054c-5330550 366->374 367->367 369 5330478 367->369 368->367 369->363 376 533055b 373->376 374->373 375 5330552 374->375 375->373 376->376
                                                                                APIs
                                                                                • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 053304ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4059807913.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_5330000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: ae61c2e2a9b84f95e176f9c411629aa18097c64d3c1752ca3bb40ff198fb0598
                                                                                • Instruction ID: 2cac416677e404e8a83b3fd3d444a6199f8c059afae4c514a911ba0efb23adf1
                                                                                • Opcode Fuzzy Hash: ae61c2e2a9b84f95e176f9c411629aa18097c64d3c1752ca3bb40ff198fb0598
                                                                                • Instruction Fuzzy Hash: 444144B1D00349DFDB14CFA9C989B9EBBF2BB48304F248129E809AB351D7B59945CF91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 377 10b4c63-10b4cb3 382 10b4d02-10b4d08 377->382 383 10b4cb5-10b4cc4 call 10b4848 377->383 386 10b4d09-10b4dd8 RtlGetVersion 383->386 387 10b4cc6-10b4ccb 383->387 392 10b4dda-10b4de0 386->392 393 10b4de1-10b4e24 386->393 399 10b4cce call 10b52e8 387->399 400 10b4cce call 10b52f8 387->400 388 10b4cd4 388->382 392->393 397 10b4e2b-10b4e32 393->397 398 10b4e26 393->398 398->397 399->388 400->388
                                                                                APIs
                                                                                • RtlGetVersion.NTDLL(0000009C), ref: 010B4DBE
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4031375448.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_10b0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: Version
                                                                                • String ID:
                                                                                • API String ID: 1889659487-0
                                                                                • Opcode ID: 50df6ca020cdbb7d549858ef5b8b921538879d30067228763c30bfd22f451b7a
                                                                                • Instruction ID: 3a0190997f96a960ce0efeb2195df6bf2a01211479476e8c90ed44a3bffac085
                                                                                • Opcode Fuzzy Hash: 50df6ca020cdbb7d549858ef5b8b921538879d30067228763c30bfd22f451b7a
                                                                                • Instruction Fuzzy Hash: A641AC30A013599FEB60AF68D848BADBBB5FF44300F0081E9D509A7281DB745A94CF92

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 401 4f8001c-4f80091 402 4f8009c-4f800a0 401->402 403 4f80093-4f80099 401->403 404 4f800a8-4f800bd 402->404 405 4f800a2-4f800a5 402->405 403->402 406 4f800cb-4f80122 CreateProcessAsUserW 404->406 407 4f800bf-4f800c8 404->407 405->404 408 4f8012b-4f80153 406->408 409 4f80124-4f8012a 406->409 407->406 409->408
                                                                                APIs
                                                                                • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 04F8010F
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcessUser
                                                                                • String ID:
                                                                                • API String ID: 2217836671-0
                                                                                • Opcode ID: 255f8525b4cd75f283a8bf4ce60be01e5d8491098e94cc74464618c593ca2d71
                                                                                • Instruction ID: 2cead9bd7f794b650af5040c979503f29d02220b57e4b50ea692b91091ea0b7c
                                                                                • Opcode Fuzzy Hash: 255f8525b4cd75f283a8bf4ce60be01e5d8491098e94cc74464618c593ca2d71
                                                                                • Instruction Fuzzy Hash: 12414476900249DFCB01CFA9C880ADEBBF1FF48310F15842AE958AB250D775AA5ACF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 423 5332b40-5332bcb 429 5332bcd-5332bda 423->429 430 5332bdc-5332bf4 423->430 429->430 433 5332bf9-5332c28 RegDisablePredefinedCache 429->433 431 5332cb6-5332cbe 430->431 437 5332cbf 431->437 435 5332c31-5332c4c call 5332608 433->435 436 5332c2a-5332c30 433->436 441 5332c51-5332c6d 435->441 436->435 437->437 444 5332c78-5332cb4 441->444 445 5332c6f 441->445 444->431 445->444
                                                                                APIs
                                                                                • RegDisablePredefinedCache.ADVAPI32 ref: 05332C11
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4059807913.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_5330000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CacheDisablePredefined
                                                                                • String ID:
                                                                                • API String ID: 1885667121-0
                                                                                • Opcode ID: 33175b44a933917ebed72c49a21f63cd47e817aca13d206268953dafc421b221
                                                                                • Instruction ID: ef3fed2a14e978d361eef2ecd800549eda2f3e95215a35dc529053fc49b81891
                                                                                • Opcode Fuzzy Hash: 33175b44a933917ebed72c49a21f63cd47e817aca13d206268953dafc421b221
                                                                                • Instruction Fuzzy Hash: 30313574D00348DBDB14DFA9D945BDEBBB6AF88310F148429E805AB3A4DBB45845CF51

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 447 4f802d8-4f802e2 449 4f802e4-4f802e6 447->449 450 4f802e7-4f8128a 447->450 449->450 453 4f8128c-4f8128f 450->453 454 4f81292-4f812f7 CreateNamedPipeW 450->454 453->454 456 4f812f9-4f812ff 454->456 457 4f81300-4f81321 454->457 456->457
                                                                                APIs
                                                                                • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 04F812E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 2489174969-0
                                                                                • Opcode ID: 363389a522b927eb1b0334c73e8f99268d1bd38123a8a2817e72624949c6201c
                                                                                • Instruction ID: e3d6256354c7a1beb69ff072ee2cbdf49f42806e58583310245cd2806fb86965
                                                                                • Opcode Fuzzy Hash: 363389a522b927eb1b0334c73e8f99268d1bd38123a8a2817e72624949c6201c
                                                                                • Instruction Fuzzy Hash: 42316871801348DFCB11DF99D984ACABFF1FF48310F14805AE958AB222D775A81ACF61

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 460 4f802f4-4f8128a 462 4f8128c-4f8128f 460->462 463 4f81292-4f812f7 CreateNamedPipeW 460->463 462->463 465 4f812f9-4f812ff 463->465 466 4f81300-4f81321 463->466 465->466
                                                                                APIs
                                                                                • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 04F812E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 2489174969-0
                                                                                • Opcode ID: 38d5f0d5e6e033815050f2a3ad71963b7b274332a99316bdc641578d4d2f45b1
                                                                                • Instruction ID: 8d85e574174b0ede42c81c3cbe3ddb61cbd2e59a71c80fae38ecf63fd3376664
                                                                                • Opcode Fuzzy Hash: 38d5f0d5e6e033815050f2a3ad71963b7b274332a99316bdc641578d4d2f45b1
                                                                                • Instruction Fuzzy Hash: EE3103B1801248DFDB10DF9AD988A8EBFF5FF48314F14C069E918AB221D775A856CF51

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 469 4f81ecc-4f81f66 ConnectNamedPipe 471 4f81f68-4f81f6e 469->471 472 4f81f6f-4f81fb1 469->472 471->472 476 4f81fbb 472->476 477 4f81fb3 472->477 478 4f81fbc 476->478 477->476 478->478
                                                                                APIs
                                                                                • ConnectNamedPipe.KERNEL32(00000000), ref: 04F81F50
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: ConnectNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 2191148154-0
                                                                                • Opcode ID: 4ed073b019c8e29caa492d7322193d6a4077ffe9b9d54aab487a686941f24833
                                                                                • Instruction ID: a2f2e31197a4e314abebdd4785a4f2cb6cfd23f4d867c0ef789ced974d67c412
                                                                                • Opcode Fuzzy Hash: 4ed073b019c8e29caa492d7322193d6a4077ffe9b9d54aab487a686941f24833
                                                                                • Instruction Fuzzy Hash: 512112B0D00259DFCB14DF9AC584B9EBBF1AF48704F20816DE859AB341DB75A842CF90
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: d
                                                                                • API String ID: 0-2564639436
                                                                                • Opcode ID: 9c0ff7b216aed3581e6d77cb7341077ce1e5d6a752e6de2c1dd04c5baa574206
                                                                                • Instruction ID: fd2f2ffe7e9d72376fede54bebb7fe35c7805deaa61c81dbc890d72bfd9a8ff8
                                                                                • Opcode Fuzzy Hash: 9c0ff7b216aed3581e6d77cb7341077ce1e5d6a752e6de2c1dd04c5baa574206
                                                                                • Instruction Fuzzy Hash: 7BD15F75A00605CFCB04DF68D89499AB7F1FF8D310B1586A9E909AB366DB30EC85CF80
                                                                                APIs
                                                                                • ConnectNamedPipe.KERNEL32(00000000), ref: 04F81F50
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: ConnectNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 2191148154-0
                                                                                • Opcode ID: 8309c70e7a940b5b79ce74b9851c1de5eaf3cd6b7ddc85148d77ee867b32b621
                                                                                • Instruction ID: 8e298d43cd7e75757078cec6e07d095ec9a3b92b651fae9e79076a5abc44b3f1
                                                                                • Opcode Fuzzy Hash: 8309c70e7a940b5b79ce74b9851c1de5eaf3cd6b7ddc85148d77ee867b32b621
                                                                                • Instruction Fuzzy Hash: 952124B0D00258DFCB14CF9AC584B9EBBF5BF48700F108169E809AB341DB74A802CFA0
                                                                                APIs
                                                                                • WaitNamedPipeW.KERNEL32(00000000), ref: 04F8232F
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: NamedPipeWait
                                                                                • String ID:
                                                                                • API String ID: 3146367894-0
                                                                                • Opcode ID: 277967be5dcad7bcd13ae5224d2d711bf07631326de2791779e5d4a25704cc60
                                                                                • Instruction ID: 0555cc8aef4a47b9a0f106d35531995e690ed5479d4fb58f62d91b8cd565f2cc
                                                                                • Opcode Fuzzy Hash: 277967be5dcad7bcd13ae5224d2d711bf07631326de2791779e5d4a25704cc60
                                                                                • Instruction Fuzzy Hash: D32113B2C0020A8FDB14DF9AC484BDEBBB4AB48324F15846DD859A7240C779A546CFA1
                                                                                APIs
                                                                                • WaitNamedPipeW.KERNEL32(00000000), ref: 04F8232F
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4058527896.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_4f80000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: NamedPipeWait
                                                                                • String ID:
                                                                                • API String ID: 3146367894-0
                                                                                • Opcode ID: 8b9eebb7be247b3978ede2ea03fc1133489e2767d6a8b6721fae2ebfb956da0c
                                                                                • Instruction ID: b52ecf368dd53a4058c8f41d81dc94127dc957027cab762b1e58f00bd8e4bfe5
                                                                                • Opcode Fuzzy Hash: 8b9eebb7be247b3978ede2ea03fc1133489e2767d6a8b6721fae2ebfb956da0c
                                                                                • Instruction Fuzzy Hash: 0721F4B6C002098FDB14CF9AC444BDEBBF4AB48324F15846DD859A7240C779A545CFA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: c!
                                                                                • API String ID: 0-3867720870
                                                                                • Opcode ID: 802628198893c01436371db05b45533594dfaac881b6c740cc556b5bdc6893e3
                                                                                • Instruction ID: e18a864bd47db9623b328036a9cdf8a893511f16d0b4f9c1ddaa13fe1b8f7ec3
                                                                                • Opcode Fuzzy Hash: 802628198893c01436371db05b45533594dfaac881b6c740cc556b5bdc6893e3
                                                                                • Instruction Fuzzy Hash: C5B17D30A102099FDB05DF69D88099EBBF2FFC5320B14856DE515AB315EF71ED468B80
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0;k
                                                                                • API String ID: 0-1039690602
                                                                                • Opcode ID: 5b64d4a5e101b7ddb1f5f1a2c3f88f5fc10f279f71f97bd5b2f2e6cd8fc08bc8
                                                                                • Instruction ID: 9335185343b9bb1242faa70a69dc988324e998539151ee0b6d307205966e1172
                                                                                • Opcode Fuzzy Hash: 5b64d4a5e101b7ddb1f5f1a2c3f88f5fc10f279f71f97bd5b2f2e6cd8fc08bc8
                                                                                • Instruction Fuzzy Hash: DF719B3871024A8BDB05DBACC8505AEFBB6EFC9310B6486AEE5059B355DF74DC028B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cc34bf6a42e191b528fc08606071c5af86c1f3d40fa21fc4847efd18914deda8
                                                                                • Instruction ID: 470ce3f4c567cbb786bd805d9ef470fd1f6cd4abeab7b51478b7ebea0cad62ba
                                                                                • Opcode Fuzzy Hash: cc34bf6a42e191b528fc08606071c5af86c1f3d40fa21fc4847efd18914deda8
                                                                                • Instruction Fuzzy Hash: 52E1E1315097C49FE716EB38D8605C97FB1EF86314B08869EC0858B252EF689A09CBA5
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 92149c5e545fa56e651d7425d93ef3248cec5f32e151dcf0103c905e7cfa64e7
                                                                                • Instruction ID: 171c6e1b6d58b0d40a4d90c415a30c5c032ebf491019f8b6330a0923df175b6a
                                                                                • Opcode Fuzzy Hash: 92149c5e545fa56e651d7425d93ef3248cec5f32e151dcf0103c905e7cfa64e7
                                                                                • Instruction Fuzzy Hash: F3817E35B102598BDB15EBA8C8506EEBAB2AFC8750F54813DE406AB385DF349E41CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 36064c7ddd61c64036da83d89730baf5f2859728037f9c8ed29243d7bb41b89e
                                                                                • Instruction ID: a1d9120589504145358d2df75b3e4beaea08a8b1ce1dbf19961ef851b79be55f
                                                                                • Opcode Fuzzy Hash: 36064c7ddd61c64036da83d89730baf5f2859728037f9c8ed29243d7bb41b89e
                                                                                • Instruction Fuzzy Hash: 14818E306006099FD719EF78D85069EBFE2FFC8314B009A6CD145AB755EFB4AA498BD0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4a90605c5c23923f161712f32c2f6df24f9e07a675c9c3932f7af877cf3511d0
                                                                                • Instruction ID: 46ca610e102a9aff797313a884e0541b0895d0873fb88d9e5163340e314b9251
                                                                                • Opcode Fuzzy Hash: 4a90605c5c23923f161712f32c2f6df24f9e07a675c9c3932f7af877cf3511d0
                                                                                • Instruction Fuzzy Hash: 5A719E75B102459FCB14DB68D884AAEBBF6FF88310B1884AED506DB361DB70DC46CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ea7777feae6260322cf378db399eda6139f9b96d31734c210dbecb5b9fdb7119
                                                                                • Instruction ID: d3f35c16894edc1c90e2609dcd79e56de320f92af66a5ac3b24812a25e560220
                                                                                • Opcode Fuzzy Hash: ea7777feae6260322cf378db399eda6139f9b96d31734c210dbecb5b9fdb7119
                                                                                • Instruction Fuzzy Hash: 3151EE307102469FDB15EB6AD89066F7BE6FBC932071486BDD115CB344EFB1AC468B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: caeb5befac4a2cc157a6765de90c5a0ba07118f870ddcb24006da8580cd34934
                                                                                • Instruction ID: 24cf345a244549628ec1297e3b5e6a97979d1873490066e61bc60fa0c418c090
                                                                                • Opcode Fuzzy Hash: caeb5befac4a2cc157a6765de90c5a0ba07118f870ddcb24006da8580cd34934
                                                                                • Instruction Fuzzy Hash: 5D51DD307102429FDB05EB6AD89066FBBE6FBC9320B1485ADD1159B345EFB5AC458B80
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9e9b56ad4a969e321e876c4960bb122c87b04301d6276a203492616a47b98ba3
                                                                                • Instruction ID: 242970832fde767c4188dc6e25cf78d13914687850a6d1b8bd2ce508d669877d
                                                                                • Opcode Fuzzy Hash: 9e9b56ad4a969e321e876c4960bb122c87b04301d6276a203492616a47b98ba3
                                                                                • Instruction Fuzzy Hash: 2C518D71E1024A8FDB14DFA5C880BDEFBF5AF88714F28816DE505B7241DB74A946CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b93f8190a526e68246bdb35b32595073d7f0395c9a38ffdffc90fbd3babb88f2
                                                                                • Instruction ID: e8a0326880907876595968c18af8a276d78f00b5b2572517ade5d65e9f0d04b9
                                                                                • Opcode Fuzzy Hash: b93f8190a526e68246bdb35b32595073d7f0395c9a38ffdffc90fbd3babb88f2
                                                                                • Instruction Fuzzy Hash: 3341F3759296C48FDB12CB68C9A8AA8BFF0BF56300F0D44DEC545DB363D6685C06CB61
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 614e4dba3e4ae7ae8fd08f7890b4e67f521d9f2fed904d4f2bda92a6fd369008
                                                                                • Instruction ID: 965385a92937ae6b3618ecbfe4c2cff8fbf72f52f767378764e1c801833c34bf
                                                                                • Opcode Fuzzy Hash: 614e4dba3e4ae7ae8fd08f7890b4e67f521d9f2fed904d4f2bda92a6fd369008
                                                                                • Instruction Fuzzy Hash: FE51D2307113818FD705EB7A889062E7BE6BFC632071885AED1118B386EF75AC45CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a467b21737ed6d386ce8a750fd6fc4d907ebab895b2b0385153a889f43daa66b
                                                                                • Instruction ID: 9a7df863cb9dbdd3d7d857b5e9ab49a774182fcac275ef81eff98b490f1c672f
                                                                                • Opcode Fuzzy Hash: a467b21737ed6d386ce8a750fd6fc4d907ebab895b2b0385153a889f43daa66b
                                                                                • Instruction Fuzzy Hash: C9513630700645CFDB24DF2AD89495AFBF6FF893207148A6DD49ADB764EB30E8058B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e81117600d344d59bd1ba3ff7b6c46ca06da891864b5acd13419f6b11bc61a11
                                                                                • Instruction ID: aae9d0350bf09788665dff20074fe259f1084f0c40c73aaddba5c9e803be4b53
                                                                                • Opcode Fuzzy Hash: e81117600d344d59bd1ba3ff7b6c46ca06da891864b5acd13419f6b11bc61a11
                                                                                • Instruction Fuzzy Hash: 94411139A192C8EFE706EB6888740AEBFB1FF41304B0884DEC6419B352DA785915CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2da20781918a15e5c59ec7540f637e13585b688928917e8a707dacbd67fd19cc
                                                                                • Instruction ID: a4b6fbcbcfb9e566708a3f98087c8661bc49b6cdb9c2d2dcbb5dac3ba0528d36
                                                                                • Opcode Fuzzy Hash: 2da20781918a15e5c59ec7540f637e13585b688928917e8a707dacbd67fd19cc
                                                                                • Instruction Fuzzy Hash: CB410B30610705CFC724DF29D898A66B7F2FF89314B184A6DD596DB7A5DB30E806CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1b86fbc0251d196fa40a8cf4c6bb160c7059e9fc189dd60483cb03d62347b84f
                                                                                • Instruction ID: b1125c8a86ab229998bd0b577cbd1c3a8ab66a838cd061cc475bb108871253be
                                                                                • Opcode Fuzzy Hash: 1b86fbc0251d196fa40a8cf4c6bb160c7059e9fc189dd60483cb03d62347b84f
                                                                                • Instruction Fuzzy Hash: D841595291E7D1AFE327A72CA8B00C57F70EE5325470D10CFC580CF2A3E995890AC7A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e69759e6ab1d44d47d223147c85a07f9102b8f9b46966ca8779b1d71e84c3473
                                                                                • Instruction ID: 432b7a69aa4423efc405193c5964f6025778fd0cc8b1b2cce421cd36ec219b17
                                                                                • Opcode Fuzzy Hash: e69759e6ab1d44d47d223147c85a07f9102b8f9b46966ca8779b1d71e84c3473
                                                                                • Instruction Fuzzy Hash: DD415030610745CFD724DF29C484A5ABBF2FF89360B188A5DE4868B791EB31F846CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9dd0faed7c3b375aff65051eb80ed553ff097296864bfb71b1723243a094340b
                                                                                • Instruction ID: 259f659ba7911ea88268707bf24a9817bd96d8baf0957318382ff50203d9987c
                                                                                • Opcode Fuzzy Hash: 9dd0faed7c3b375aff65051eb80ed553ff097296864bfb71b1723243a094340b
                                                                                • Instruction Fuzzy Hash: BD314C34B102158FCB04DBA9C854AAEFBF6EF89314B50856ED50AE7308DB34ED018BA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6b5a35122d7ac16a0bd6362b16348298528c5d89028fe889e2f2c374a374ed6e
                                                                                • Instruction ID: d48b72e6f78367ac7108cb56c2a5e6ef3fed7dc94005a93ecd72d605bd6851e0
                                                                                • Opcode Fuzzy Hash: 6b5a35122d7ac16a0bd6362b16348298528c5d89028fe889e2f2c374a374ed6e
                                                                                • Instruction Fuzzy Hash: 034128347106868FCB19DB68D994D5ABBF2FF8931071889ACE91A8B361DB30ED44CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 76cff41a53986d9e375629a1c7a3500c5aea2cc8d865440091710def08a61a86
                                                                                • Instruction ID: 39ead6824e3bb4a15513deb9325f35673b1b421fa51b381097ecbd8b7330c255
                                                                                • Opcode Fuzzy Hash: 76cff41a53986d9e375629a1c7a3500c5aea2cc8d865440091710def08a61a86
                                                                                • Instruction Fuzzy Hash: 6B3192719181888FDF15DB68C9A4AAD7FF1BF9A300F0944ADD505AB362DA745C01CB61
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c8df8ede301845d8e28566967e6871d12fc88864e367473f8a9fb1c73b8b0a19
                                                                                • Instruction ID: be17927d086dad78424d1adeed4219968525ff7334dc9bc7edabab6e0207d9ea
                                                                                • Opcode Fuzzy Hash: c8df8ede301845d8e28566967e6871d12fc88864e367473f8a9fb1c73b8b0a19
                                                                                • Instruction Fuzzy Hash: 9731E7347106468FCB18DB69D994D5ABBF6FF8931471889ACE91A8B361DF30EC44CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 02e19fcb05ee3ea7981758771425dae3bba589a9771b0e9d951d7e6ce4b19fca
                                                                                • Instruction ID: 4896b7e8c126a4c89244ea3a4c5b803e41555aac1a03aa22261eec40419df1ca
                                                                                • Opcode Fuzzy Hash: 02e19fcb05ee3ea7981758771425dae3bba589a9771b0e9d951d7e6ce4b19fca
                                                                                • Instruction Fuzzy Hash: B4310A30610B458BC734DF7AD8A865BBBF2BF84321B144B2DD466876E0DB70E948CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ed18df7938a95fcae1839cbd409230cd4a1218bd463c90f0d31750f903d5b352
                                                                                • Instruction ID: ed2531eca2a880c5e51155bba2d8f490e31ef44324f250ba59deb68f441fb64a
                                                                                • Opcode Fuzzy Hash: ed18df7938a95fcae1839cbd409230cd4a1218bd463c90f0d31750f903d5b352
                                                                                • Instruction Fuzzy Hash: EC31C270A11285CFDB20CF29C884AAABBF2AF8A360F18455DD845DB355E731F806CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 27909f84a12304f032917101cb2ff2a95485c8064185ca9e9ebfd3f7f0a0b92b
                                                                                • Instruction ID: b2103964eb0c52f6280080a23f50c03e8b31041eeb5422d9af1b91d4131c094b
                                                                                • Opcode Fuzzy Hash: 27909f84a12304f032917101cb2ff2a95485c8064185ca9e9ebfd3f7f0a0b92b
                                                                                • Instruction Fuzzy Hash: 34219F356092C08FC326CB29D89199A7FF6EFC631071944EED155CF3A2CA64EC45CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6c19e68756defa0c74cc365bf4e1013f3d29f18bceb1f4918e9a40ad4f1b6c62
                                                                                • Instruction ID: f82bea913d3b9946ad8dccda8a8a7b19c2a3119ef0fb6391f08d23909fbcda07
                                                                                • Opcode Fuzzy Hash: 6c19e68756defa0c74cc365bf4e1013f3d29f18bceb1f4918e9a40ad4f1b6c62
                                                                                • Instruction Fuzzy Hash: B721CFB19193C99FC716DBB8CC14598BFF0EE03200B0C45DEC589CB262EA34AA09DB52
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2ead563987f8444943f53d24c012b2afb57256d137052d326a5433f13f5b2b17
                                                                                • Instruction ID: 8e8543df3768427c2cb02a9c9771fc4f3120d863ff7a23bccd424568cd2815b4
                                                                                • Opcode Fuzzy Hash: 2ead563987f8444943f53d24c012b2afb57256d137052d326a5433f13f5b2b17
                                                                                • Instruction Fuzzy Hash: 5B21C4765193C49FD312CB59C864B69BF79AF86320B0DC0DEE9488F2A3C635D805D761
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0d92c4956928335eec33d432ddb3d770400115d6453006d56840f9bd6030a55e
                                                                                • Instruction ID: 3beb8a2c6e733305f39f8970e889aba0992a1dba7ec08aec20ff0f6637b775e2
                                                                                • Opcode Fuzzy Hash: 0d92c4956928335eec33d432ddb3d770400115d6453006d56840f9bd6030a55e
                                                                                • Instruction Fuzzy Hash: D63167B6804389DFDB10CF99C884ADEBFB1FB48310F18846EEA54A7211C7B89555CFA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4030872666.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_f1d000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 83f9d9cf4f58dbd9cfaec0ca2dda2f2de2e6bc2ae4a672b665e249224c67c6e2
                                                                                • Instruction ID: b20f2a1f724b5b542cacc27ac8eb72bf022ba26e68522c5b7d9fed80d1fb5ca0
                                                                                • Opcode Fuzzy Hash: 83f9d9cf4f58dbd9cfaec0ca2dda2f2de2e6bc2ae4a672b665e249224c67c6e2
                                                                                • Instruction Fuzzy Hash: 6F2167B6504340DFCB05DF10D9C0B6ABF75FB98320F20816CE9090B296C336D896EBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 166954d366dff2e0ab79f538f045c5389353c2b11f974dfec707cf4ba1b2d432
                                                                                • Instruction ID: a82430f95a171d916dec82db365f780b9156e202ca3393a7c05c3615ccef031a
                                                                                • Opcode Fuzzy Hash: 166954d366dff2e0ab79f538f045c5389353c2b11f974dfec707cf4ba1b2d432
                                                                                • Instruction Fuzzy Hash: 9721F871A14119CFDF18DBA8C994AEDBBF2BF89310F44406DD515AB3A1DB74AC40CBA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 00d4d1fe1bf559b79d58678e70eddda5d52987347554e162631271d5a90844e4
                                                                                • Instruction ID: 56b6d5638a8079fde7036c4a8f048262c0b2e1140bcb77c3d735f1c88fb73019
                                                                                • Opcode Fuzzy Hash: 00d4d1fe1bf559b79d58678e70eddda5d52987347554e162631271d5a90844e4
                                                                                • Instruction Fuzzy Hash: D6219030204602AFD319EB24DC50A99BFA1FFC5314F048A6DE1059B696DFB5A905C7D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4eb27ceab0bf53540935a7b4894ae837e567a2bd8f5fe0603ce5451e82321cae
                                                                                • Instruction ID: 26bc636385966850edbf5ecde3aef5ae77f03d1f9cdffdc41fe04bb9c8f252a7
                                                                                • Opcode Fuzzy Hash: 4eb27ceab0bf53540935a7b4894ae837e567a2bd8f5fe0603ce5451e82321cae
                                                                                • Instruction Fuzzy Hash: 4711EF367042485FEF4AAFAC98102BE3BA3EBC9260754457DE506CB381DF344E12C795
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 523de0c3772df0ff85470c9f67d98092750efd6ea2d7e4c5c7242a840b01a862
                                                                                • Instruction ID: ceec119e3deb83bc9f1f52a275916d209acdff5ca5742a829301b31747849a05
                                                                                • Opcode Fuzzy Hash: 523de0c3772df0ff85470c9f67d98092750efd6ea2d7e4c5c7242a840b01a862
                                                                                • Instruction Fuzzy Hash: F8216831D10B4A9ECB11EFB9C8501EAFBB4EF99310B00C72AD559B7111FB70A294CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 807cd31d30ce2cf5a8df4f83c89ca58b6f0954c2ece6fc354ff43be204f40936
                                                                                • Instruction ID: abb54ccf6acbf9bb5ee6c65471ab42e2157e62a497b810ab85a6e3074af96f22
                                                                                • Opcode Fuzzy Hash: 807cd31d30ce2cf5a8df4f83c89ca58b6f0954c2ece6fc354ff43be204f40936
                                                                                • Instruction Fuzzy Hash: 622123B680024A9FDB10CF9AC844ADEBBB5FB88310F14842DE914A7201C779A551CFA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8bf5c14abaca8ff1f6bff5190feea5fbd5e1f8277e0bc1fc22a75894865afbc5
                                                                                • Instruction ID: 734e30d2f4275966d71b849da52a4c7ff96799f6e2cabbd0a157962d3ece9e88
                                                                                • Opcode Fuzzy Hash: 8bf5c14abaca8ff1f6bff5190feea5fbd5e1f8277e0bc1fc22a75894865afbc5
                                                                                • Instruction Fuzzy Hash: C62114B680024ADFDF10CF9AD844BDEBBB1FB88310F148529E919A7211C779A555CFA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2b9a8d9a9ac9fa5a8c2b93d05254b29ee68538aea74e871a1a411a14b6a0f893
                                                                                • Instruction ID: d7617a35a4ab4329a5eafd00f7b511c2c4bb59e280a2d7ebb832eb0e932a3018
                                                                                • Opcode Fuzzy Hash: 2b9a8d9a9ac9fa5a8c2b93d05254b29ee68538aea74e871a1a411a14b6a0f893
                                                                                • Instruction Fuzzy Hash: 431108217105808FCB19DA6E885465EBBEAEFC936474581AED409D7355DF30ED048390
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 32bc19f28bc22bce0d81399286a8ca8ca4b5b08416fdda85fe7a25e5c5e5895e
                                                                                • Instruction ID: d5437e89d7852096ebdc255a50cc6e67d74664223f919540ebd894ac0df1bfb2
                                                                                • Opcode Fuzzy Hash: 32bc19f28bc22bce0d81399286a8ca8ca4b5b08416fdda85fe7a25e5c5e5895e
                                                                                • Instruction Fuzzy Hash: ED01803A7110008FC704DA6EF8949AAB7FAFFD936532885BAE509C7351CA329C179754
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8f7530e769d51c1b249ceb7fd6edfc8df91ef5d6c8fbd84dfdffafa70ac60789
                                                                                • Instruction ID: cd922a124088cd612cc03974a9c069450d421b9e198767b06f440de25d9f2a73
                                                                                • Opcode Fuzzy Hash: 8f7530e769d51c1b249ceb7fd6edfc8df91ef5d6c8fbd84dfdffafa70ac60789
                                                                                • Instruction Fuzzy Hash: 6411A175319AC05FC706D768D8D49A9BFA6EF9A31031D84DED049CF257CA24AC03C791
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9fe9f8b8d2d21bfa470e2a6733f09cf6da568cde4bf6288ccd91492e14693c73
                                                                                • Instruction ID: 242d84b87510916cc407d12f56217aa074107e97d1be487e74a5ba5183292178
                                                                                • Opcode Fuzzy Hash: 9fe9f8b8d2d21bfa470e2a6733f09cf6da568cde4bf6288ccd91492e14693c73
                                                                                • Instruction Fuzzy Hash: AD110E616093C44FCB06DB388C6449A7FBACE8731030E84EFD044EF263EE259D0687A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 915bf1d083267b715e9beb35e4c5f633104993509c0d302c18a3f93590476518
                                                                                • Instruction ID: 3b85445cea1e84b74e6abc9503a7ea35b80caa8446b814d5a0b5bfbb185ce355
                                                                                • Opcode Fuzzy Hash: 915bf1d083267b715e9beb35e4c5f633104993509c0d302c18a3f93590476518
                                                                                • Instruction Fuzzy Hash: BD211578E00209DFDB04EFA9D8545AEBBB1FFC8300B108DA8D615A7355DB346A55CF91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4030872666.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_f1d000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                                • Instruction ID: c8ff06c4fcb5c2e67af699cd95c5ce10d558840c7b1ee97b5ab61a9e2c5dda20
                                                                                • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                                • Instruction Fuzzy Hash: 8811E676904280CFCB16CF10D9C4B56BF72FB98324F24C6ADD8090B256C33AD856DBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 72b709db5438cf351674a09b426d72ac61eba6dc05e858ebb03b322423b2448d
                                                                                • Instruction ID: 812b5a9e8116268c919b4112f8649554357de8813959f62e46acd8f4dcbff58d
                                                                                • Opcode Fuzzy Hash: 72b709db5438cf351674a09b426d72ac61eba6dc05e858ebb03b322423b2448d
                                                                                • Instruction Fuzzy Hash: 3611CC76A142899FCF11CAA8DC449EEBBB9EF85311B08417FD514E7201E6309515C7E1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0ef56846abf4b7a180e4794b43d790cd7f9bfae1fea3878803fcb68ca3302915
                                                                                • Instruction ID: 2e2dcae63d7d82f08ffde68a868d87095635f6507d77fef02348bea50e6d00ea
                                                                                • Opcode Fuzzy Hash: 0ef56846abf4b7a180e4794b43d790cd7f9bfae1fea3878803fcb68ca3302915
                                                                                • Instruction Fuzzy Hash: 42116D71A102898FCB14DF68C545AAEBBF1FB49320F2486ADD515DB3A1DB31D980CF81
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 93882a838539c2fa1cecbf61549d298cb12419b2dc3f942fcde2d25075717549
                                                                                • Instruction ID: bff179a7dad18395dc42843adfa9550431499c3a8daa398a6f396bfdb8985cbd
                                                                                • Opcode Fuzzy Hash: 93882a838539c2fa1cecbf61549d298cb12419b2dc3f942fcde2d25075717549
                                                                                • Instruction Fuzzy Hash: 30018C357006568FC720DB69D49495AB7EABFCD76032840AEE94A8B311CB20EC02CBC0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f3c8086603065e0bbf6840c5bbc1065baaab542ef1afaae80f618d1984deee2b
                                                                                • Instruction ID: cadea137748d8b73725abe47b7374a95f5719d5488cf4d15a892a609e7b1551d
                                                                                • Opcode Fuzzy Hash: f3c8086603065e0bbf6840c5bbc1065baaab542ef1afaae80f618d1984deee2b
                                                                                • Instruction Fuzzy Hash: 1901D271B093809FC702DA28EC609967FF5EED222030845FFD494CB353EA689D0A9791
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bfc88dff3c40576bf3d313d4bb0aa0e13468ff6f5f8c13d86b96aee94f13dfde
                                                                                • Instruction ID: 1e5a13d0fd02d46d17fa692eeb868a374e448500741d7ce090a02ca23bb83f59
                                                                                • Opcode Fuzzy Hash: bfc88dff3c40576bf3d313d4bb0aa0e13468ff6f5f8c13d86b96aee94f13dfde
                                                                                • Instruction Fuzzy Hash: E301DF313006096FD705E76998856AEBAD3FFC9224724893DE30A8B344DF74DD0987D2
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4030872666.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_f1d000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 616d0d1c1f41a166a3d0bbfac64dae1e82cb89c44fab40b86ea869af45a02715
                                                                                • Instruction ID: d7a56cd7ac81d060c1dea9995a2cb93208d929b484496c1a960fd30c83f8edab
                                                                                • Opcode Fuzzy Hash: 616d0d1c1f41a166a3d0bbfac64dae1e82cb89c44fab40b86ea869af45a02715
                                                                                • Instruction Fuzzy Hash: 32012B72804344DAE7104F25CDC0BA7BFE8DF45374F18C01AED494B18AC7B99881D6B1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4030872666.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_f1d000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 73b2ba2089873fe491ce64442ab58ec63e17071f76c57ed722385e4a48a120a0
                                                                                • Instruction ID: ef6401bc2ee05362b5f0d2f7093775f3e1481da08296c1f5720dc60f0a09a610
                                                                                • Opcode Fuzzy Hash: 73b2ba2089873fe491ce64442ab58ec63e17071f76c57ed722385e4a48a120a0
                                                                                • Instruction Fuzzy Hash: 31014C6140E7C09FE7128B258894B52BFB4AF53224F1980DBD9888F1A7C2695849C772
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ee0770e0ab4acdd5cf5ce78ac6dfea348ad73ad00ae2fef6c13f9c1b4e95dc40
                                                                                • Instruction ID: 30d464eb196aeca2caeafb57f0845237d5c041625114434200090085ef45dfed
                                                                                • Opcode Fuzzy Hash: ee0770e0ab4acdd5cf5ce78ac6dfea348ad73ad00ae2fef6c13f9c1b4e95dc40
                                                                                • Instruction Fuzzy Hash: 8D010571D0020ACFCB44DFA9C8419DEBBB1EF89300B1485A9D918EB211E735AB12CFC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 70d6c060867c3ded04158f749b3144396957cf2917a6228e0d6f79cc7bf7adfb
                                                                                • Instruction ID: 8df5b0a0ed6b1e4e0abece524d77fe07149c4b8567cd96cca86268ae72753374
                                                                                • Opcode Fuzzy Hash: 70d6c060867c3ded04158f749b3144396957cf2917a6228e0d6f79cc7bf7adfb
                                                                                • Instruction Fuzzy Hash: 3201D16180E7C5AFC713DB718D21A4D7FB89E4320078980CFD485DF1A3D5295E08E7A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 51bfb09ef4f126dc843365f4b8633324fb9b587a69f009c48ee3c9c621fc4563
                                                                                • Instruction ID: 955f26f3648ecd6ba9af31c307d4282d43278e9e0b88507c1101e58c9a41f4da
                                                                                • Opcode Fuzzy Hash: 51bfb09ef4f126dc843365f4b8633324fb9b587a69f009c48ee3c9c621fc4563
                                                                                • Instruction Fuzzy Hash: 97F0C2327047845BD715D729A85449EBFEADECA360308C9FEE508DF212EE31DD028790
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3073d9e9d085af4611d5af4f4fe251cbded203c555375370d7c532e8497a5702
                                                                                • Instruction ID: 2c84c64f4adf4adee455af4a0f26a7f79b97452d7ddad38fdc633955021f176f
                                                                                • Opcode Fuzzy Hash: 3073d9e9d085af4611d5af4f4fe251cbded203c555375370d7c532e8497a5702
                                                                                • Instruction Fuzzy Hash: CE018CB09293D59FC716DBBC88140A8BFF1EE0721070C48DFD588CB262E2249A05DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: de5243212673314d2b01c48a73190b6ef98a772b0caf2c966d64befaefc7e107
                                                                                • Instruction ID: f114e175f181ecfffe32151fea5a31aa100fefa15be884ec62b9b90f43bb0607
                                                                                • Opcode Fuzzy Hash: de5243212673314d2b01c48a73190b6ef98a772b0caf2c966d64befaefc7e107
                                                                                • Instruction Fuzzy Hash: 87F0E232B0E2C21FC71286399CA09D6BBB6DFE7250B5504FEC049C7253C86A4C4ACB20
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2cbf560507535c59593ac87fbe956dcaa276a8b56111c4b050f09436073b02ac
                                                                                • Instruction ID: 4ed7c0e53127eac1adb034f51810868322eb9fad1945a8676522d53b7facdc0d
                                                                                • Opcode Fuzzy Hash: 2cbf560507535c59593ac87fbe956dcaa276a8b56111c4b050f09436073b02ac
                                                                                • Instruction Fuzzy Hash: 07F0E2707007019BD214EA5EA89085BBBEAEBC4720348857EE119C7300DE74E8059790
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 16f163d9c4d090b6e3b608e50da1b1da18c3943a4071e85355eb1643674e5237
                                                                                • Instruction ID: ca46588a26e8fb63b1db0e5548d7a4d3156cd068957679608286852df7edc83d
                                                                                • Opcode Fuzzy Hash: 16f163d9c4d090b6e3b608e50da1b1da18c3943a4071e85355eb1643674e5237
                                                                                • Instruction Fuzzy Hash: 04F0AFB190028ADEDF22DB65D9287ABBFF4EB80311F40896CD5119B292DB741948DB82
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2f8d6516b2c4f9d6366330472d01f1e2dafbd790d88937e96d9c99ef2a0fc669
                                                                                • Instruction ID: 0466190ff2ea8a649e202ce978d980a7989584feb3a5e914e6d4ca6cde58ac23
                                                                                • Opcode Fuzzy Hash: 2f8d6516b2c4f9d6366330472d01f1e2dafbd790d88937e96d9c99ef2a0fc669
                                                                                • Instruction Fuzzy Hash: 47F0F0719092C9EFC706CBB4CC0016C7FB1EB92200B0846EED605C7353EA345E0AEB52
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b3d07288f150ae900473774caa4a6b06a69c0a64fd5b21e8cee9a9a991365409
                                                                                • Instruction ID: 41b13be4d0bc90c7788d65b2967ce2c95d948604eca26d484a25fc0985aa782a
                                                                                • Opcode Fuzzy Hash: b3d07288f150ae900473774caa4a6b06a69c0a64fd5b21e8cee9a9a991365409
                                                                                • Instruction Fuzzy Hash: 2BF0CDB0D4024ACFDF10DB69E8247AEBBF4F780325F00896DC62097241CB7419599B82
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8e1286539f1c2f88c2be12b402266ebeb2b1f90b10afe6ded96f20cb6d1a4122
                                                                                • Instruction ID: fed440cd56ba95b90a54bfc4c9371927cfd29014837e25a7b24dc1f26577e9d7
                                                                                • Opcode Fuzzy Hash: 8e1286539f1c2f88c2be12b402266ebeb2b1f90b10afe6ded96f20cb6d1a4122
                                                                                • Instruction Fuzzy Hash: ABF03A35211644CFC324CB29D584A66BBF6AF86711B1984ADD5868B3A1CB72FC41CB51
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: acc8b247a6c76d89d97283f43c410032dc846f0d9100e8ef13cbf9b4c8ef36ee
                                                                                • Instruction ID: 4faf3fd4bc20cbe50842f26b8a0a8b2e674d0776cc1652f38d565477d92d2b16
                                                                                • Opcode Fuzzy Hash: acc8b247a6c76d89d97283f43c410032dc846f0d9100e8ef13cbf9b4c8ef36ee
                                                                                • Instruction Fuzzy Hash: 5EF01730700518DFC715DB69C454AAEBBE1EF88311B048069E905CB364EA34DE01CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3da4dcd0882889f2dd1d3fa41de459c99344836bede14d3dab6b79bbecfa359f
                                                                                • Instruction ID: 3b217b20ad54eb8dcefca4a7f4821e170d27bd850abb319848a98016900508d5
                                                                                • Opcode Fuzzy Hash: 3da4dcd0882889f2dd1d3fa41de459c99344836bede14d3dab6b79bbecfa359f
                                                                                • Instruction Fuzzy Hash: 08E03035714248AB9754DA8ED800D9BBBAEDBC9260718C06EF948C7300DA31D9028BA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1e996f147fdd77e8de8bb47df7a2b05845be869412f57716ea4bbb0a1480a2d3
                                                                                • Instruction ID: 344d3365a888af9b824fda8d0f045fa255fa2c3cf7531f78d90742e61647e217
                                                                                • Opcode Fuzzy Hash: 1e996f147fdd77e8de8bb47df7a2b05845be869412f57716ea4bbb0a1480a2d3
                                                                                • Instruction Fuzzy Hash: 52F0E530805A48AFCF02DFA8D8016ACBBF4EF91200B1046EEC404DB602EA315E46AB45
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 50b03f5ae8f562416b90468199e47a6a8d312aad2d55adb15c88440d7a2ee059
                                                                                • Instruction ID: 07f5f070092f28abad08f0b3e2f5d079bb4d80d50b04d2229546d4a258943779
                                                                                • Opcode Fuzzy Hash: 50b03f5ae8f562416b90468199e47a6a8d312aad2d55adb15c88440d7a2ee059
                                                                                • Instruction Fuzzy Hash: B6F06271E00219DF8B84DFADD94169EFBF5EF89210B64816AD918E7211E731AA12CFD0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a0460c24a9e84e20c94e13c32fcbe3d55c444724adc73cb3ef7d136374a22450
                                                                                • Instruction ID: 7c64053f752869138fe097dbe903dd3cca0a7fc6880818833f07a3a2e24ab6ee
                                                                                • Opcode Fuzzy Hash: a0460c24a9e84e20c94e13c32fcbe3d55c444724adc73cb3ef7d136374a22450
                                                                                • Instruction Fuzzy Hash: 71F0C9B6D051549FCB80DFACD8465EEFBF0AF49200B2481AEC419E7211E23196129FC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 80362c5266de4c5e1180c01432d6a4e4b225818ef5feb5b3b68c438e685dc73f
                                                                                • Instruction ID: c92c235dddb4a6c8255752869bd046fb82b1864678f366ddc010f7231fb24633
                                                                                • Opcode Fuzzy Hash: 80362c5266de4c5e1180c01432d6a4e4b225818ef5feb5b3b68c438e685dc73f
                                                                                • Instruction Fuzzy Hash: B4E092303002048FC314DB1AD144D16BBEAEFC9721B5584ADE5098B3A1CB71FC41CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bdb12239aa13f33f41adfed4e9ff144e58333ba625154a7454da5c3dd52e6b62
                                                                                • Instruction ID: 819472610d46e05c9aa98537c81b5329ba3f83656aba4bc62c530874d7816def
                                                                                • Opcode Fuzzy Hash: bdb12239aa13f33f41adfed4e9ff144e58333ba625154a7454da5c3dd52e6b62
                                                                                • Instruction Fuzzy Hash: 5DE086327012155BC314952AEC90997B3FADBC9624F10487D950DD7356CD769C878690
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fa926553dbea9c7a5430891b9108979a3f16cc4d36da4f487aa00aa9d94c7079
                                                                                • Instruction ID: 2eb461716275721f69e4537fab734e7fde5cc860927bf84c8226e58f4263a352
                                                                                • Opcode Fuzzy Hash: fa926553dbea9c7a5430891b9108979a3f16cc4d36da4f487aa00aa9d94c7079
                                                                                • Instruction Fuzzy Hash: E5E0B671D002299F8B80EFADD9415AEFBF4EF48210B50846AD91CE7201E3319B128FC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 43d48f0c5211ee26d6031deb5a01c4d0e0abd355851990eef3147552c9d77dcb
                                                                                • Instruction ID: 17e61db18247b459214aa14ff6df658614691daf524bd739eae251b2d7648b58
                                                                                • Opcode Fuzzy Hash: 43d48f0c5211ee26d6031deb5a01c4d0e0abd355851990eef3147552c9d77dcb
                                                                                • Instruction Fuzzy Hash: 32D052347611254FCB84E738E44886E33EAAFC9A2035084B4E80ACB325EEA0EC0187D0
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5d532f74f79ba8401bb490a59a07b0b2ba5c601c4ca5f992bbdcf596fcf566bf
                                                                                • Instruction ID: 08ebea40715e747a19cf80cd4c574863ac36b79d4301ff4512b480db7960f933
                                                                                • Opcode Fuzzy Hash: 5d532f74f79ba8401bb490a59a07b0b2ba5c601c4ca5f992bbdcf596fcf566bf
                                                                                • Instruction Fuzzy Hash: CAD01730A0120CEF8B04EFA8E90159DBBF9EB85204B1085ADD808E3200EA312F45AB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b0978b94b8422e97e0f82247581b9ee2b48cb874bbb56a4ee00a3e4d8d20ae68
                                                                                • Instruction ID: 3a8da395005b4d6183d9895adef81496136c96d282624a9c3e4d60f1b34b5bc9
                                                                                • Opcode Fuzzy Hash: b0978b94b8422e97e0f82247581b9ee2b48cb874bbb56a4ee00a3e4d8d20ae68
                                                                                • Instruction Fuzzy Hash: 21D01730A4020DEFCB00EFA8ED0199DBBF9EB84214B1046E8D509E3300EA316F49AB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3bc896cc19e800ac3b90559e797c4d8a0723b6a4ba4a71ee5a35af1cfeaca425
                                                                                • Instruction ID: cc60badcc321fc62711694ec181c3fb20c447aaa8baf0673204ffd510503ead2
                                                                                • Opcode Fuzzy Hash: 3bc896cc19e800ac3b90559e797c4d8a0723b6a4ba4a71ee5a35af1cfeaca425
                                                                                • Instruction Fuzzy Hash: F6E01231404B0DDACB00BF68D444559F7B4EFD5301F04C75AE84D5A112EB74D6D8EA91
                                                                                Memory Dump Source
                                                                                • Source File: 00000008.00000002.4050624185.00000000037C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 037C0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_8_2_37c0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d106519f6c2eea3ec0bae3f00604c2e5124ce749164d78df87a932ff714bba82
                                                                                • Instruction ID: f8ddfe15240c4ae4d7c66b7fbcb764432e3e1f6e6b633fede6b75ec7117e919c
                                                                                • Opcode Fuzzy Hash: d106519f6c2eea3ec0bae3f00604c2e5124ce749164d78df87a932ff714bba82
                                                                                • Instruction Fuzzy Hash: 49D0C731414B0D89C700BB78D454469F778EED5200F00C75AE44957121FF70D5D0D681

                                                                                Execution Graph

                                                                                Execution Coverage:11.3%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:8
                                                                                Total number of Limit Nodes:1
                                                                                execution_graph 15921 7ffd33893642 15922 7ffd338b5690 CreateNamedPipeW 15921->15922 15924 7ffd338b57c3 15922->15924 15916 7ffd33898014 15918 7ffd3389801d 15916->15918 15917 7ffd33898082 15918->15917 15919 7ffd338980f6 SetProcessMitigationPolicy 15918->15919 15920 7ffd33898152 15919->15920
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 00394980914c75b5bd2b7e0ec6cdf4dc19a174d022676411844e577850f08df6
                                                                                • Instruction ID: 8afb54470a7f421ba7ed8f8f5a7b90e7a5d4f510e35ba3c2cbac81f143e2f164
                                                                                • Opcode Fuzzy Hash: 00394980914c75b5bd2b7e0ec6cdf4dc19a174d022676411844e577850f08df6
                                                                                • Instruction Fuzzy Hash: 9313AE30A18A5D8FEBA9DB28C9A47A877F1FF58300F1041B9D44DE7292DE35AD81DB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3142810e1507222c22497a3421d38bcc7813568d57f9874af9f31bc69f470db3
                                                                                • Instruction ID: f5edbb1330ff14af92f4707b339fae2dc125a4a635970e3d9f87372a4b2b7f95
                                                                                • Opcode Fuzzy Hash: 3142810e1507222c22497a3421d38bcc7813568d57f9874af9f31bc69f470db3
                                                                                • Instruction Fuzzy Hash: 841233A2B1CECB4BFBE9AA2885753B473D1EF54340F5401BAD98DD71C3DD28A8469342
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 38c55d88a9ad46b90ad7dd54e6b9b350d367235a46eee66fcbfa4c8b13f5f407
                                                                                • Instruction ID: 65cfd7cd8d12b003d304494de4d4b26d46a18e0a7dcaf05b25c9f7cdbbbc781c
                                                                                • Opcode Fuzzy Hash: 38c55d88a9ad46b90ad7dd54e6b9b350d367235a46eee66fcbfa4c8b13f5f407
                                                                                • Instruction Fuzzy Hash: B4120731B1CE8A4FE7D5E7A8C5766B967D2EF84340F54007AE18DE32D2DE29B8059342
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ef4e27f99aa213c1b8bc455796f6db93d4b97dfb9f6e7050f50b6e54b42b035b
                                                                                • Instruction ID: 3d961cf7ad97d2f039bb1acb91f915c47654895513d9f061e54e9ff47bddfbc8
                                                                                • Opcode Fuzzy Hash: ef4e27f99aa213c1b8bc455796f6db93d4b97dfb9f6e7050f50b6e54b42b035b
                                                                                • Instruction Fuzzy Hash: 6B12E461B0DE8A4FE7D9DB28C5716B53BE1EF99300F0401BAD58DDB283DD2CA8459352
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 08a3ad7e20815f7ff933a200c93b0b8a1eb69ca65964440c50879643cc17aaf2
                                                                                • Instruction ID: d4e78bffcbd9b7d86979fef053e4f0ab4937efc3b070d07f5cf6c60815e4133f
                                                                                • Opcode Fuzzy Hash: 08a3ad7e20815f7ff933a200c93b0b8a1eb69ca65964440c50879643cc17aaf2
                                                                                • Instruction Fuzzy Hash: A8D19453B0C5A64AF262B6ACB9B90ED3B64CF4133EB095173D1CC9B0939C9C648F52E5
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6b1f85e818d3453a157624824d5347648d5f576a995f420efb1cc04146cfc4ea
                                                                                • Instruction ID: fc8c38096ab7deacd4d2a5458ec18d2a4a10cf3583865d944b75435cf1ff8bff
                                                                                • Opcode Fuzzy Hash: 6b1f85e818d3453a157624824d5347648d5f576a995f420efb1cc04146cfc4ea
                                                                                • Instruction Fuzzy Hash: 46C18353B0C5A64AF252B6ACB9B50ED3B64CF4133EB0951B3D1CC9B093DC98648F52E5

                                                                                Control-flow Graph

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: `y3$hy3$py3
                                                                                • API String ID: 0-3317460086
                                                                                • Opcode ID: 194a10168fdddad7c6020d35a0b8c6cef667eefca6997fee320883e1f4d4b577
                                                                                • Instruction ID: fe468e877fb12b49cd036f9ab9ef8add9ab6ccbaf5ed93346231335317fd1401
                                                                                • Opcode Fuzzy Hash: 194a10168fdddad7c6020d35a0b8c6cef667eefca6997fee320883e1f4d4b577
                                                                                • Instruction Fuzzy Hash: AE91D472B0DD894FEBD8EA28C865AA577D1FF94710B0401BED48DDB287DD29F8068781

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4055679188.00007FFD33890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33890000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: MitigationPolicyProcess
                                                                                • String ID:
                                                                                • API String ID: 1088084561-0
                                                                                • Opcode ID: bbe47c138b8bc1dafff22d8a7aa88cb7cacfc2b82ba684a97aae3ab2bfdbf343
                                                                                • Instruction ID: acdaf386b8b03466ff69e17ad2e5fca732c7abc236e9f79c84a813e54f0cb9e2
                                                                                • Opcode Fuzzy Hash: bbe47c138b8bc1dafff22d8a7aa88cb7cacfc2b82ba684a97aae3ab2bfdbf343
                                                                                • Instruction Fuzzy Hash: A141293190CB494FDB18AFA8985A5F97BF0EF55311F04017FE049D3292DE78A84687D1

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 668 7ffd33893642-7ffd338b56fa 671 7ffd338b56fc-7ffd338b5701 668->671 672 7ffd338b5704-7ffd338b57c1 CreateNamedPipeW 668->672 671->672 674 7ffd338b57c9-7ffd338b57fc 672->674 675 7ffd338b57c3 672->675 675->674
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4055679188.00007FFD33890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33890000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33890000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID: CreateNamedPipe
                                                                                • String ID:
                                                                                • API String ID: 2489174969-0
                                                                                • Opcode ID: 16cb26a36ad859c9e3da8e1fb25b1f47acd4e7b2077ac4d074d5023503080b7e
                                                                                • Instruction ID: af318573ea56e0685771126c073460085b01f8c3d04e6f3e41e6249288fcb581
                                                                                • Opcode Fuzzy Hash: 16cb26a36ad859c9e3da8e1fb25b1f47acd4e7b2077ac4d074d5023503080b7e
                                                                                • Instruction Fuzzy Hash: EF51A17191CA1C8FDB68EF5C9845BE9B7E0FB59710F1442AEE04DE3251CB71A8468BC1

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1046 7ffd33bac90f-7ffd33bac922 1049 7ffd33bac940-7ffd33bac947 1046->1049 1050 7ffd33bac924-7ffd33bac92a 1046->1050 1051 7ffd33bac948-7ffd33bac967 1049->1051 1050->1051 1052 7ffd33bac92c-7ffd33bac93f 1050->1052 1056 7ffd33bac972-7ffd33bac9b5 1051->1056 1052->1049 1061 7ffd33bac9b7-7ffd33bac9f9 1056->1061 1062 7ffd33bac9fb-7ffd33baca10 1056->1062 1061->1062 1065 7ffd33baca97-7ffd33bacaa0 1062->1065 1066 7ffd33baca16-7ffd33baca3f 1062->1066 1072 7ffd33baca85-7ffd33baca93 1066->1072 1073 7ffd33baca41-7ffd33baca4c 1066->1073 1078 7ffd33baca95 1072->1078 1079 7ffd33baca94 1072->1079 1076 7ffd33bacaa8-7ffd33bacac9 1073->1076 1077 7ffd33baca4e-7ffd33baca83 1073->1077 1084 7ffd33bacae8-7ffd33bacaf1 1076->1084 1085 7ffd33bacacc-7ffd33bb3b90 1076->1085 1077->1072 1078->1065 1079->1078 1090 7ffd33bb3b91 1085->1090 1090->1090
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: _
                                                                                • API String ID: 0-701932520
                                                                                • Opcode ID: 57a44824e9fd8462d855ac5cd230fb4671a576b7251dcf23ff744ec0387a5ac7
                                                                                • Instruction ID: 199630e18ac66d7099eb5f31e86dbeedf6a95f40ac7c453ebb1fe6bc6a754039
                                                                                • Opcode Fuzzy Hash: 57a44824e9fd8462d855ac5cd230fb4671a576b7251dcf23ff744ec0387a5ac7
                                                                                • Instruction Fuzzy Hash: 78414B52B1CD8E4FEBD5EA2DC8666B977C1EF982A0B540076D18CD718BDC28F8475382
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: y3
                                                                                • API String ID: 0-1655320972
                                                                                • Opcode ID: ddbf4723ec5adda54c55b51696f2055781e6e6ea7b447b3fd09226abbf2e1f23
                                                                                • Instruction ID: c42bdae920ce4db06a47b6dc77630a3864860d5f3ed226ef29142525fbd24075
                                                                                • Opcode Fuzzy Hash: ddbf4723ec5adda54c55b51696f2055781e6e6ea7b447b3fd09226abbf2e1f23
                                                                                • Instruction Fuzzy Hash: 9411A2B2E0DE884FEF95DE549DA11E83BA0EF55300F0500ABD1DDE7192DA35A505D742
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ace8e9fe78e44e275591834f5123cb9fc4cd6d82e93f8bdbf06a2c29a910d877
                                                                                • Instruction ID: 83f6ee95e7ce9976cc42416bccc46254ec95ce86823937e2cc7b66c9ff8a81c2
                                                                                • Opcode Fuzzy Hash: ace8e9fe78e44e275591834f5123cb9fc4cd6d82e93f8bdbf06a2c29a910d877
                                                                                • Instruction Fuzzy Hash: 24C1CC34708A498FDADCEF19C1A4AA573E1FFA4304B6509ADD05ECF297CA25F846CB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1806e8b6d7c057ba61d363786824ffe43b43fbb4403ecd4de2e66143401b7c57
                                                                                • Instruction ID: 0c83cc0ec7699ab25aeb3db5452f079e1bbdaaf3cdb7744dd595f737eb4c477f
                                                                                • Opcode Fuzzy Hash: 1806e8b6d7c057ba61d363786824ffe43b43fbb4403ecd4de2e66143401b7c57
                                                                                • Instruction Fuzzy Hash: A4C1CD34708A498FDADCEF19C0A4A6573E1FFA4304B6509ADD05ECF29BCA25F846CB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1071b0ae10a484b0478291a329615a9eef1d24b67c4a3739721dd696f4e31c69
                                                                                • Instruction ID: 6147915305a3ec78008ce22ca7c0326e9d59086a413ff79107f27076d2681918
                                                                                • Opcode Fuzzy Hash: 1071b0ae10a484b0478291a329615a9eef1d24b67c4a3739721dd696f4e31c69
                                                                                • Instruction Fuzzy Hash: 70B19E34708A498FDADCEF19C4A4A6573E1FFA4304B6509ADD05ECF29ACA25F846CB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8073b0ea4c41452e10eb08fc2557a8518d2ebcd321287871cd3e3d85b941614a
                                                                                • Instruction ID: 7f96ce3d6bf00ee5eb40c302e0c25d0e7742ff6954b410b479f33189d8644bd1
                                                                                • Opcode Fuzzy Hash: 8073b0ea4c41452e10eb08fc2557a8518d2ebcd321287871cd3e3d85b941614a
                                                                                • Instruction Fuzzy Hash: 0B911662B0DE8A4BEBE8D918C5A14B573E1EF54310B14017BC5CED7582ED24B94B83C2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 23b68a0299015297624887531865a18bbad577a272d70baf53731d9db01db57c
                                                                                • Instruction ID: 4cd1eb3c68538d0139e25afaddd598b4160fcbbd60fafeef249461cf75383dc8
                                                                                • Opcode Fuzzy Hash: 23b68a0299015297624887531865a18bbad577a272d70baf53731d9db01db57c
                                                                                • Instruction Fuzzy Hash: 30617020B18D4A8FEBD5EB6C8465BB973E2FF98700F5441B9E05DD3297CD28AC419782
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fd157c5c6f07905884ee010ac359e6718b6794e11262c197c1b78831e4cf59b2
                                                                                • Instruction ID: f73778bcc4dc29fef6d8b2c77fbbeb0171dea39fba3a15c6ba54203a38090d37
                                                                                • Opcode Fuzzy Hash: fd157c5c6f07905884ee010ac359e6718b6794e11262c197c1b78831e4cf59b2
                                                                                • Instruction Fuzzy Hash: 82516852B1DD8E0FEBD5EB2CC8696B57BD0EF98250B4401B7D08CC318BDC28AC065392
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 96e8a1509d2031fc98cd39b616c9fd163be828ecd5c410aa3fa4009dc0362e49
                                                                                • Instruction ID: b35543bdb5c48193a05d77af3e42b8c1e1e03ff9bc67fbd6befef7e881738e9f
                                                                                • Opcode Fuzzy Hash: 96e8a1509d2031fc98cd39b616c9fd163be828ecd5c410aa3fa4009dc0362e49
                                                                                • Instruction Fuzzy Hash: D951263570DE498FDBDCEF18C1A16A173E2FBA8304B2445A9C06DDB68ACA25EC43C741
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6a8ec52b5b8efac9cbf775152ea5e606e54a4ea03ea5d7a19b2456c713d575aa
                                                                                • Instruction ID: b905307bc75992c78e7e6a548a7a13a1144db706b8d7b0531ef87562395910bf
                                                                                • Opcode Fuzzy Hash: 6a8ec52b5b8efac9cbf775152ea5e606e54a4ea03ea5d7a19b2456c713d575aa
                                                                                • Instruction Fuzzy Hash: BF51D431E0D99A4FFBD4FB28C86A7A477E0EF54340F4041BED58DE3292DD28A9859742
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0f5b2a7c413af42d24cc262af9396b18b200ae2787c48ca9cb7e7f998e56fe43
                                                                                • Instruction ID: 26046a335e8323fd2a170d382a2821520b16ceba28c26d8eecc5ed75d40930c2
                                                                                • Opcode Fuzzy Hash: 0f5b2a7c413af42d24cc262af9396b18b200ae2787c48ca9cb7e7f998e56fe43
                                                                                • Instruction Fuzzy Hash: 3441A521B28D8A4BEBE8EA18C4B56A573D2FF94344F5441B9D09DD3286DE38FC428781
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6e73e2f715ccf76d5be722144c98d37a772d05edb7a3a1b1c816fb499def5dfe
                                                                                • Instruction ID: 44955a4f9fa44a6190fdbca61113e00bb70e58666d43d0768e81103e789d95e9
                                                                                • Opcode Fuzzy Hash: 6e73e2f715ccf76d5be722144c98d37a772d05edb7a3a1b1c816fb499def5dfe
                                                                                • Instruction Fuzzy Hash: 9441C572B1DECE4FFBD5DA28C8756A43AD2EF95300F5400BAD09CD72D2DE25A8419742
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 33763212c278cfc568c1546d079aece6e9a41f0975980783b06b68736cb18007
                                                                                • Instruction ID: 947dc8eca018a2769de7dfacdd28c1dd95345bf158abd33d7d9d07462816cd22
                                                                                • Opcode Fuzzy Hash: 33763212c278cfc568c1546d079aece6e9a41f0975980783b06b68736cb18007
                                                                                • Instruction Fuzzy Hash: B1312931B28D4E4FE7D5FB2CD865578B3D1EB98311B44027AC48DC3192DE29EC428382
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d499c9e8d92b4468ff7ce4eb6d277b26ffa1774d048d144f49092ea987af9b83
                                                                                • Instruction ID: b02aeb61cc85dab8cdd943317b9520616acd4d6e25160bdca0d147202f5f9144
                                                                                • Opcode Fuzzy Hash: d499c9e8d92b4468ff7ce4eb6d277b26ffa1774d048d144f49092ea987af9b83
                                                                                • Instruction Fuzzy Hash: 07317752B1EEC70BEBE6926CD8655E53BD1EF5121070802BBD0CDC71C7DD08A8469383
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 878afdee70b04838647a3fcb9d324771cbdf5fd59c4b1c153bae2c18dc27fb2a
                                                                                • Instruction ID: 89b25191a67fd1660ccf9bca72ec6c70707d207a238983ae4abeac22ac80de91
                                                                                • Opcode Fuzzy Hash: 878afdee70b04838647a3fcb9d324771cbdf5fd59c4b1c153bae2c18dc27fb2a
                                                                                • Instruction Fuzzy Hash: 38319763A086A94FE391F7ACE9F50E977B0DF41229B0901B3D1CCDB093ED58384B5291
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f0fa6c6c2c5881633df5a0613aefbf67dd03f87901ac7f12cdf774aa9ac14d70
                                                                                • Instruction ID: 4e556f19ad74f556fe671b1e605d8d523596aff15502294aa7ff29a67f0e7729
                                                                                • Opcode Fuzzy Hash: f0fa6c6c2c5881633df5a0613aefbf67dd03f87901ac7f12cdf774aa9ac14d70
                                                                                • Instruction Fuzzy Hash: E031E312B1DECA0FE7A5A72889792B876E1AF95250F1940FBD08CC71D3DD189C468382
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 72b10d8737c6d44a5ad7c9a5e155b52279207f94e7249fdf4364253756aaae71
                                                                                • Instruction ID: 2f3c6d76557e017c0f1a317a74db7268230df88bdde066619098cfd3a3c09624
                                                                                • Opcode Fuzzy Hash: 72b10d8737c6d44a5ad7c9a5e155b52279207f94e7249fdf4364253756aaae71
                                                                                • Instruction Fuzzy Hash: 0D31A12270CD4A1AFF94EA18D4A28F573E0EF51350B40413BE9CE87587DD29F9568782
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bde497d6fdf1f6da15eb611b09c0c110d11a5f9ffd9e7d4f4bf259b10add432c
                                                                                • Instruction ID: 74e7fbcfba2e9bd0cf3dba927c833bc6817b7adcc5069fc1738468a603ebaead
                                                                                • Opcode Fuzzy Hash: bde497d6fdf1f6da15eb611b09c0c110d11a5f9ffd9e7d4f4bf259b10add432c
                                                                                • Instruction Fuzzy Hash: 1A31C661B0DA8B4FEB9A9B5885713B87BE1EF5A300F1801BAD58DD71C7DD1C68068343
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7f1b4aa0c0cce64303cc9e5d09ede411fe90d2425e66964f2d71f20372563e2f
                                                                                • Instruction ID: 7b8b7f457de6db07bb52d6f9787d9af46ff5fd42bc2e99aa4045a064a2eabf26
                                                                                • Opcode Fuzzy Hash: 7f1b4aa0c0cce64303cc9e5d09ede411fe90d2425e66964f2d71f20372563e2f
                                                                                • Instruction Fuzzy Hash: AF214862B1DDC90FE7D4EA6C88A96B473D1EFA8351B0401BBD58DD7293DD186C828342
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4364b2fe32118596ebdae2850e6d67a25e3123a061bb8ce4e6c8ae7dd0f93c94
                                                                                • Instruction ID: 502eb6c7aeae25cfb47c7686bb3595a27e16ca9974adcf0e1e6ca4ab32956270
                                                                                • Opcode Fuzzy Hash: 4364b2fe32118596ebdae2850e6d67a25e3123a061bb8ce4e6c8ae7dd0f93c94
                                                                                • Instruction Fuzzy Hash: BD314C71A0495D8FEBD4EB1CC8697E473E1FB58300F5041BAD58EE72A2DE38AD819B41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e9b973d1c19758403f902d752f868966a60665e687f2e5e972e7245fcb535cac
                                                                                • Instruction ID: cc38cbf22046e25a0fb65c477533d1bb876a0b9b52e0f316a31c96f98c6bb36c
                                                                                • Opcode Fuzzy Hash: e9b973d1c19758403f902d752f868966a60665e687f2e5e972e7245fcb535cac
                                                                                • Instruction Fuzzy Hash: 16215973F0C9C747F791AABCD9714E97750EF21318B0804B6C1DE97083ED1868069A92
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4dd0d13dd66153729a2829bda564edee8609fb9c9ad9b94a1200b8407dda5a2d
                                                                                • Instruction ID: ffc6e25c10bcc8efa592ba14443480c82c662b419c6ef6e5766586988168c6f2
                                                                                • Opcode Fuzzy Hash: 4dd0d13dd66153729a2829bda564edee8609fb9c9ad9b94a1200b8407dda5a2d
                                                                                • Instruction Fuzzy Hash: 2721D973E0CEC74BF7D19A78C9614E57760EF22359B050176C1DDE7083ED1AA8469B42
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1bc1d082e4adcbb43efd32dbaf52b4388dbbb068a67ec37b93a7a0a215e9c5b8
                                                                                • Instruction ID: d31566c8d4a48ba80e0120db374b459658b8c60d1a3d7dda5f556ba7a94152b4
                                                                                • Opcode Fuzzy Hash: 1bc1d082e4adcbb43efd32dbaf52b4388dbbb068a67ec37b93a7a0a215e9c5b8
                                                                                • Instruction Fuzzy Hash: DA213321B0DE864FE7E5976885316B5AAD2EF89301F0540B6D2CDE76D2CD1CA805B352
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 074b5f84bf48f74fd652eec9b55309bdafa5c67a1540134d56488a07dabbd876
                                                                                • Instruction ID: 9d45b58445568c44347cd0cf37c9e1646d155dde10b588554824e0dbe11bffbf
                                                                                • Opcode Fuzzy Hash: 074b5f84bf48f74fd652eec9b55309bdafa5c67a1540134d56488a07dabbd876
                                                                                • Instruction Fuzzy Hash: FC21FB11B1DA8A0FE3E4E76C98B267477D1FF65310F4401BAD19DD7293ED59AC804392
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b2e8c5466f20e2a3c3d85709ca9f2e6bd732125728318b2052c9e8769e67263d
                                                                                • Instruction ID: 42c6fd4438164c7945b66c8fd00111fc381e65b67d86b3ef26b9e8c9d6e620cb
                                                                                • Opcode Fuzzy Hash: b2e8c5466f20e2a3c3d85709ca9f2e6bd732125728318b2052c9e8769e67263d
                                                                                • Instruction Fuzzy Hash: 0331FF71A099598FEBD4EB18C869BA8B7F0EF58301F4041EAD54DE3262DE34A9818B41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7f9fcb1cb9efed01f7174f12c75293dfe365cb58ae6458627221f983a0a62edc
                                                                                • Instruction ID: 312474b93d2a94bbc7a8977f12fe1407fe8695940832fed3fbf7f0d72d93cf71
                                                                                • Opcode Fuzzy Hash: 7f9fcb1cb9efed01f7174f12c75293dfe365cb58ae6458627221f983a0a62edc
                                                                                • Instruction Fuzzy Hash: FF110832B1C68A4EEB8CDA58E8226F83780EF85225F00007AD2AD97683DD1674178282
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ea957e6beb4d497a75a7cf702adf945feeadb2b6e5b0290367401b63204fbf0e
                                                                                • Instruction ID: cbaea9ba024c9982ff285aa5cc07fa4221edd8579354829cacfdd6bc78eb4923
                                                                                • Opcode Fuzzy Hash: ea957e6beb4d497a75a7cf702adf945feeadb2b6e5b0290367401b63204fbf0e
                                                                                • Instruction Fuzzy Hash: 4211B45260E7C50FE307573C89794A47F60DF1371870905F7C1C99B1A3ED09584A9712
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f7ba4330aeb1933495a3cd762f85732d940c4419b5c1bfa1cd529d5cb61ae55b
                                                                                • Instruction ID: 8e2afac7fe963163db184a56fccce104e821c9ab487f0679b066671840341dd4
                                                                                • Opcode Fuzzy Hash: f7ba4330aeb1933495a3cd762f85732d940c4419b5c1bfa1cd529d5cb61ae55b
                                                                                • Instruction Fuzzy Hash: 50114C71B099894FEBC8EF18C164A6577D1FF58300F0441B9D48DDB287CA39E8469781
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7ec9ce078559ab9db955a35587882130916d4d42ca9fa253bd197eae16678dc7
                                                                                • Instruction ID: 7357ce62fdfb599a187601a4a9ccbd2a94d3353ec997b69f3a95c22cef60a1d7
                                                                                • Opcode Fuzzy Hash: 7ec9ce078559ab9db955a35587882130916d4d42ca9fa253bd197eae16678dc7
                                                                                • Instruction Fuzzy Hash: 6C112B71B099894FEBC8EF18C564B6577E1FF69300F0441B9D48DDB287CA39E8468781
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 92a7962c6099d67aac0b52558ae3af586ee921b685490c2adc4511e1999c0f4a
                                                                                • Instruction ID: 20fc7ffa1d7967807b8ba49fa7b63e83873da79a6a87a2bbfc2834f475b39192
                                                                                • Opcode Fuzzy Hash: 92a7962c6099d67aac0b52558ae3af586ee921b685490c2adc4511e1999c0f4a
                                                                                • Instruction Fuzzy Hash: E301DF21B19E4E4FE2D8FB3C956927C62C2FBDC255710017AD14DD3396DD29AC469340
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0120277afd2be86f49f66a067e8f3264c286862c276959947f21f25ecc89a41b
                                                                                • Instruction ID: df9c96499666d76b20505387eb85291563e6fbfd084519d653090f9c5c4331b5
                                                                                • Opcode Fuzzy Hash: 0120277afd2be86f49f66a067e8f3264c286862c276959947f21f25ecc89a41b
                                                                                • Instruction Fuzzy Hash: 7901B525F0CD5B46FBECE22982B137560D2EF84341F188179D58EE23C5DD6DACC1A242
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 81cab37da074de3ff1ee7c1472990efa1bc0af085d070e56780923921e515fb0
                                                                                • Instruction ID: ed17e42f2ab6fdb1cbcd6cd9727982f7cfe351d124e962cfaf9833b49c6fb574
                                                                                • Opcode Fuzzy Hash: 81cab37da074de3ff1ee7c1472990efa1bc0af085d070e56780923921e515fb0
                                                                                • Instruction Fuzzy Hash: A501F521B28D9A4BEFE5E61CC4256A173D2FF84704B5442BAD09DD3186DE25FC028382
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: dd974c81378f14ba02b47be21e89319ba2d0f6d73a3c6ac794ec74aa72f6f9a8
                                                                                • Instruction ID: 865d9a291d299e4c13e599e6d3c4878870ffd87f7aef775da64d227b2256deef
                                                                                • Opcode Fuzzy Hash: dd974c81378f14ba02b47be21e89319ba2d0f6d73a3c6ac794ec74aa72f6f9a8
                                                                                • Instruction Fuzzy Hash: FB012134A08A5C8FDB99DF18C8A97A5B7F0FB54301F1002AEC04EE3251CF351985DB41
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 51c073ab3ea4933a5ae19aca343009078ad4b2a0b68270186626307da2b294b4
                                                                                • Instruction ID: c0a62073bcf0d0ff7f5de4ef3757b1b7275726526f5777234c4d1df0d1b97546
                                                                                • Opcode Fuzzy Hash: 51c073ab3ea4933a5ae19aca343009078ad4b2a0b68270186626307da2b294b4
                                                                                • Instruction Fuzzy Hash: 2D01FFB0B1AD974AFEDD9B18C2B07B852D1AF55305F44007ADACEEE1C7CD18E8056252
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5d6197d85eb3644661020a03345adb87cd2dcee971f63a3b0ac41938b6eceae9
                                                                                • Instruction ID: 401de1eab55424fa69294a035712c02485695fee0b8b1cfeeb08f57ae48b2c23
                                                                                • Opcode Fuzzy Hash: 5d6197d85eb3644661020a03345adb87cd2dcee971f63a3b0ac41938b6eceae9
                                                                                • Instruction Fuzzy Hash: 3FF01931A149598EDBA4EB18D8AA6A9B3F1FF95301F4001FAD50CE3151DE34A9819F40
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5d76a83ebdb5a9d73e46e7a8a82292b1bf474e76ea4f6a7fbbc87cfa98bd0fe4
                                                                                • Instruction ID: 0e083027c48fb78508fef9d974e2c307b9a1bbeeda1c7c7b1732c21a72e4f1e8
                                                                                • Opcode Fuzzy Hash: 5d76a83ebdb5a9d73e46e7a8a82292b1bf474e76ea4f6a7fbbc87cfa98bd0fe4
                                                                                • Instruction Fuzzy Hash: AA01F671E1496D8EEBE4EB18D9A97E8B3F1EB58301F5005FAD10DE3191DE7869C08B00
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8f57afeaa50680240b34140cb5f860a00a2ea35d206994e34def6692d3ab6ebf
                                                                                • Instruction ID: 416bec075f3572fc37045d0c2b3c3f90515b603938e263b6f113d40b8d808a64
                                                                                • Opcode Fuzzy Hash: 8f57afeaa50680240b34140cb5f860a00a2ea35d206994e34def6692d3ab6ebf
                                                                                • Instruction Fuzzy Hash: A7E09BB114D50C6EA61CAA55AC079F7379CE747134F00111FE18E86002F153B5638295
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e1da037c9095f8f936d6c8752838af4340b000cc879a4275aa48dcacff9997e1
                                                                                • Instruction ID: e1b85b3cc8ddc577b7f75e3f1b3648fddb146d5687be2856f0ad3edeecfa5a32
                                                                                • Opcode Fuzzy Hash: e1da037c9095f8f936d6c8752838af4340b000cc879a4275aa48dcacff9997e1
                                                                                • Instruction Fuzzy Hash: 0BF0E510B1CC590FEBA8B36891243FC72E1DF89315F4040BED48EC62C2DD5D5D834281
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a04333964097162918eb1f0887030cee1ea791f5a43be593409ef2359be820f6
                                                                                • Instruction ID: 2bee1ff751a6d024b7ed72200918ac58ed45a3816201b322876c9d4ffab81b84
                                                                                • Opcode Fuzzy Hash: a04333964097162918eb1f0887030cee1ea791f5a43be593409ef2359be820f6
                                                                                • Instruction Fuzzy Hash: 77F0C231A1DB8D4FD795A774886A2A9BFB1BF56200B8400FAE48DC7293DD2899058792
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 18f52d86ec3138ff41e33e34173a6f9999f256fd764aaf79e800b7de90150f91
                                                                                • Instruction ID: ee4262817de8557892abfd19c4c4676b35aaffb9a5e6b5a91c9884fcf1a6f7dc
                                                                                • Opcode Fuzzy Hash: 18f52d86ec3138ff41e33e34173a6f9999f256fd764aaf79e800b7de90150f91
                                                                                • Instruction Fuzzy Hash: 43F0A03290899D9FDB51EA18D4658D9B760EF16318B0141A3E05DD7052DE25AC49CBC2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e8f4942837ade9fc3505dc1488c02979409b6ecadb4f20d7dd88ba73a72aaa10
                                                                                • Instruction ID: 6bd32241132f9eb87ddf15f8f8c511cf44503acda5c9f37e9fb1037e801d2256
                                                                                • Opcode Fuzzy Hash: e8f4942837ade9fc3505dc1488c02979409b6ecadb4f20d7dd88ba73a72aaa10
                                                                                • Instruction Fuzzy Hash: 84F0393540D6889FCB46EB68D4648D6BF70EE16324B0502C7E059CB063D7219A69CB92
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 441d8f36180c2b9d39f8e55598dfefaa6a973a4e822a1ec89364211a42c64be4
                                                                                • Instruction ID: 579bd08b9ab5b3c6d87e07be01093644d5b9b36959c7e88fcf4c121ac146c1a7
                                                                                • Opcode Fuzzy Hash: 441d8f36180c2b9d39f8e55598dfefaa6a973a4e822a1ec89364211a42c64be4
                                                                                • Instruction Fuzzy Hash: 84E0C215B4CA1B42FBAC2275B6B13B560D58F04301F0980BEE64ED12C5CD6CDCC5A192
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c69999eda9eb7ee8b598004339a3158f3c81c47ccdc6f0f9e731283f84251a9a
                                                                                • Instruction ID: 2b01a9773cda010123297a8d43ba8440dc517994e944a59121e185dc57620a17
                                                                                • Opcode Fuzzy Hash: c69999eda9eb7ee8b598004339a3158f3c81c47ccdc6f0f9e731283f84251a9a
                                                                                • Instruction Fuzzy Hash: 7DE0D850B1DDC60BE795A72484355797281EF54200F0441B9C0CDA7187DC2CA9024382
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b621923d5c849ae31db4b37def820369dc951fbdd248cb83cc15a8f5707c294d
                                                                                • Instruction ID: b2fbafd0298b16869bdc8b350663835dde40994c4d3faff4deeeac469d9b7bd9
                                                                                • Opcode Fuzzy Hash: b621923d5c849ae31db4b37def820369dc951fbdd248cb83cc15a8f5707c294d
                                                                                • Instruction Fuzzy Hash: A5E05B7161CE494FEBD4DB0CD4A2DA5F7D0FBA8358F40067EE08DE2350DA29D5808742
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4062692713.00007FFD33BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD33BA0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_7ffd33ba0000_ScreenConnect.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 103e93113d3e275860d220fe8b826aceae978bb8fc087079127a2d1249c6f1d0
                                                                                • Instruction ID: 984aa004fc32a089c7aec5d91ed4aa5227b86c4781a4dc62592cd65cf5276d0a
                                                                                • Opcode Fuzzy Hash: 103e93113d3e275860d220fe8b826aceae978bb8fc087079127a2d1249c6f1d0
                                                                                • Instruction Fuzzy Hash: C4C02220F08A8A0EFA80EF2882202BE20822F88200B808030E20CA2082CC3CA2023202